漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-050866
漏洞标题:中国邮政广告网一处隐秘的SQL注入DBA权限(泄露管理员敏感信息,邮件信息)
相关厂商:中国邮政集团公司信息技术局
漏洞作者: HackBraid
提交时间:2014-02-13 17:16
修复时间:2014-03-30 17:16
公开时间:2014-03-30 17:16
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:15
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-02-13: 细节已通知厂商并且等待厂商处理中
2014-02-14: 厂商已经确认,细节仅向厂商公开
2014-02-24: 细节向核心白帽子及相关领域专家公开
2014-03-06: 细节向普通白帽子公开
2014-03-16: 细节向实习白帽子公开
2014-03-30: 细节向公众公开
简要描述:
隐秘高危SQL注入,2000多个user,某系统管理员25W+的登陆信息,10W+的邮件信息
详细说明:
站点:
http://124.207.29.201/ 中国邮政广告网
Get型注入点:
http://124.207.29.201/CheckUserName.asp?username=
Post型注入点(注意title字段):
1.http://124.207.29.201/zygg_fb/ggzx/chaxun_guandian.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
2.http://124.207.29.201/zygg_fb/zcfg/chaxun_yzxgyw.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
3.http://124.207.29.201/zygg_fb/zcfg/chaxun_xgzs.asp submit=%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
4.http://124.207.29.201/zygg_fb/wzcp/wzcp_chaxun.asp submit=%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
5.http://124.207.29.201/zygg_fb/zcfg/chaxun_sbf.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
6.http://124.207.29.201/zygg_fb/zcfg/chaxun_yzf.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
7.http://124.207.29.201/zygg_fb/zcfg/chaxun_fagui.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
8.http://124.207.29.201/zygg_fb/zcfg/chaxun_zzf.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
9.http://124.207.29.201/zygg_fb/zcfg/chaxun_query_res.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
10.http://124.207.29.201/zygg_fb/zcfg/chaxun_zlf.asp id=88952634&title=%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD%D8%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD
11.http://124.207.29.201/zygg_fb/ggzx/chaxun_hangye.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
12.http://124.207.29.201/zygg_fb/ggzx/chaxun_zhishi.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
13.http://124.207.29.201/zygg_fb/ggzx/chaxun_diaoyan.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
14.http://124.207.29.201/zygg_fb/ggzx/chaxun_shiye.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
15.http://124.207.29.201/zygg_fb/ggzx/chaxun_fenxi.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
16.http://124.207.29.201/zygg_fb/ggzx/chaxun_guandian.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
17.http://124.207.29.201/zygg_fb/zcfg/chaxun_yzxgyw.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
18.http://124.207.29.201/zygg_fb/zcfg/chaxun_xgzs.asp submit=%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
19.http://124.207.29.201/zygg_fb/zcfg/chaxun_zd.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
20.http://124.207.29.201/zygg_fb/zcfg/chaxun_mt.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
21.http://124.207.29.201/zygg_fb/zcfg/chaxun_yl.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
22.http://124.207.29.201/zygg_fb/zcfg/chaxun_ys.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
23.http://124.207.29.201/zygg_fb/zcfg/chaxun_qt.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
24.http://124.207.29.201/zygg_fb/zuoping/chaxun_2004y1.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
25.http://124.207.29.201/zygg_fb/zuoping/chaxun_2004j1.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
26.http://124.207.29.201/zygg_fb/zuoping/chaxun_2004t1.asp id=88952634&submit=%EF%BF%BD%EF%BF%BD%CA%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD&title=88952634
27.http://124.207.29.201/zygg_fb/huwaimeiti/search_res.asp Submit=%EF%BF%BD%EF%BF%BD%D1%AF&province=0&Type=0&Price=0&InfoTime=0&gjz=88952634
28.http://124.207.29.201/zygg_fb/zhaopin/search_res.asp submit2=%EF%BF%BD%EF%BF%BD%20%D1%AF&SType=0&select2=0&select3=0&select=0&keyword=%EF%BF%BD%D8%BC%EF%BF%BD%EF%BF%BD%EF%BF%BD
后台地址过于简单:
http://124.207.29.201/manage/ 没验证码!
漏洞证明:
Get型注入点:
http://124.207.29.201/CheckUserName.asp?username=
DBA账户:
数据库列表:
数据库zygg_fb包含2603条账户信息:
数据库pian_gx_sql泄露管理员25W+的登陆信息:
还有邮件mail 10W+的敏感信息:
Post型注入:
修复方案:
未做破坏,只计算了信息量。
版权声明:转载请注明来源 HackBraid@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:10
确认时间:2014-02-14 15:05
厂商回复:
谢谢,我们会尽快联系相关负责人处理。
最新状态:
暂无