福建电信网上营业厅 http://fj.189.cn
[1- Oracle注入]
使用福建地区的帐号登录后,点击我的服务-宽带资源查询,输入手机号后点击下一步,可以看到这么一条HTTP请求:
![sshot-2015-08-07-[1].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071556462da9f5384e6264bc6244db3e2586aea1.png)
![sshot-2015-08-07-[2].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07155652d6e98218d13189d9db15dead16864baf.png)
这里的 ADDRNAME 参数可注入:
![sshot-2015-08-07-[3].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07155931cf8dee5c51114522bcf949110545ea54.png)
经测试,WAF会匹配如下关键词
使用/**/代替其中的空格(%20)即可绕过WAF;该WAF还会将传入的<>转为<>,在部分SQL语句中,可以使用BETWEEN AND等来替代大于小于这些运算符。
我们可以写个脚本来盲注(此处演示仅证明可行性):
传入真时返回地区数据,传入假时返回"未查询到任何结果"
![sshot-2015-08-07-[4].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071614505377c784bdef461687395f052a8ddd9d.png)
![sshot-2015-08-07-[5].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07161458c4568da912e5fe0a1218496578e42da7.png)
通过该方法获取到当前用户名长度为3, ascii码分别为83 82 77, 对应"SRM"。
我们也可以通过XML报错的方式来获取数据:
![sshot-2015-08-07-[6].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071618022e59a8a74d20aa331dcb5f6a094f2ae6.png)
![sshot-2015-08-07-[7].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07161934a57de4299a37fc6c84b0232194f913ab.png)
可得到当前用户名确实为SRM。
![sshot-2015-08-07-[8].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071622203eed15a4cd98a2f190796aa3ee7ed6a5.png)
当前用户权限类型为PLUSTRACE哦 ._.
![sshot-2015-08-07-[9].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07162403bc427aad13226777d82dff291e0c4e29.png)
[2- 越权查询他人手机固话业务]
直接发包吧.. 实在懒到不想截图了 ._.
注: 只有上面那个oracle注入不需要登录后的cookie,后面两个漏洞需要。
查询任意福建电信手机号的主套餐:
![sshot-2015-08-07-[12].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07163241b792717c88488c25846c91967624da9d.png)
![sshot-2015-08-07-[13].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/0716324969ff63cb960a84f2443b12cd8b7123d8.png)
查询任意福建电信手机号已开通的可选包:
![sshot-2015-08-07-[10].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07163301d26d25eac8ca3a0b0753fb2ded22b890.png)
![sshot-2015-08-07-[11].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071633087bb086de148f1d04fbb9405b4f5c8589.png)
查询福建电信任意固话号码类型、开通时间、所有业务:
![sshot-2015-08-07-[14].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/0716354914a0bd8940d0da51c99aaeb75fbd4fda.png)
(图上第一个开通时间就是电话开户的时间)
![sshot-2015-08-07-[15].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071637130e14ace58bb4f41c77377b2c3fd899bc.png)
![sshot-2015-08-07-[16].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071637225fa2ce591afec5be651aa02337706dab.png)
![sshot-2015-08-07-[17].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/0716385568538c94391618b806b8bb4027bbeed4.png)
[3- 删除任意文件]
在 业务办理-固定电话新装 中上传图片后点击删除:
![sshot-2015-08-07-[18].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071644554080a33bf0edd0099a401951ef119805.png)
我们试试删除服务器上的其他文件:
![sshot-2015-08-07-[19].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/071652586684390c14f5c8794e405ab34e1c3b27.png)
天辣!真的删掉了
![sshot-2015-08-07-[20].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07165532b59fba6fd3bce932187c712417bab7e6.png)
![sshot-2015-08-07-[21].png](https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201508/07165721d98784a4286e91f45e7564dd59103f97.png)