当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0170903

漏洞标题:华泰保险某系统存在SQL注射漏洞(支持UNION,百万数据)

相关厂商:华泰财产保险有限公司

漏洞作者: 路人甲

提交时间:2016-01-18 17:54

修复时间:2016-02-27 11:49

公开时间:2016-02-27 11:49

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-18: 细节已通知厂商并且等待厂商处理中
2016-01-18: 厂商已经确认,细节仅向厂商公开
2016-01-28: 细节向核心白帽子及相关领域专家公开
2016-02-07: 细节向普通白帽子公开
2016-02-17: 细节向实习白帽子公开
2016-02-27: 细节向公众公开

简要描述:

SQL注射漏洞(支持UNION,百万数据),求20RANK好不好

详细说明:

华泰保险集成出单系统
http://202.108.103.161:9999/htcsp/

QQ截图20160118170730.png


登录的时候抓包

POST http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=getMac HTTP/1.1
Accept: */*
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://202.108.103.161:9999/htcsp/
Accept-Language: zh-cn
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Host: 202.108.103.161:9999
Content-Length: 15
Connection: Keep-Alive
Pragma: no-cache
Cookie: JSESSIONID=122D50C621DA805034DB8DA6F887A52A
username=system


QQ截图20160118171003.png


QQ截图20160118171031.png


百万级

QQ截图20160118171305.png


10000+用户

QQ截图20160118171339.png


他们的口令全部是弱口令

漏洞证明:

登录处的注入有以下

POST http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=getBranch HTTP/1.1
Host: 202.108.103.161:9999
Connection: keep-alive
Content-Length: 15
Accept: application/json, text/javascript, */*; q=0.01
Origin: http://202.108.103.161:9999
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Referer: http://202.108.103.161:9999/htcsp/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: JSESSIONID=68FEDD38D5B21C563F64CF28708CD04C
username=admin


POST http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=loginWelcom HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=loginWelcom
Accept-Language: zh-CN
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Content-Type: application/x-www-form-urlencoded
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Connection: Keep-Alive
Content-Length: 72
Host: 202.108.103.161:9999
Pragma: no-cache
Cookie: JSESSIONID=122D50C621DA805034DB8DA6F887A52A
username=admin&password=123456&comcode=&yanzhengma=EW84&yanzhengTrue=false


其实包都差不多,就是多几个少几个参数而已

QQ截图20160118174731.png


修复方案:

一切尽在不言中

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2016-01-18 18:34

厂商回复:

非常感谢,我们尽快修复

最新状态:

暂无


漏洞评价:

评价