当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0171705

漏洞标题:华泰财产保险某系统(涉及数千万商户信息/大量交易上亿信息/海量敏感信息)

相关厂商:华泰财产保险有限公司

漏洞作者: 路人甲

提交时间:2016-01-21 17:31

修复时间:2016-03-05 09:52

公开时间:2016-03-05 09:52

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-21: 细节已通知厂商并且等待厂商处理中
2016-01-22: 厂商已经确认,细节仅向厂商公开
2016-02-01: 细节向核心白帽子及相关领域专家公开
2016-02-11: 细节向普通白帽子公开
2016-02-21: 细节向实习白帽子公开
2016-03-05: 细节向公众公开

简要描述:

详细说明:

http://219.143.162.216:7002/ht_server 存在命令执行,通过配置数据库,看到,一个AGENT表,看了下4500W商户信息,包括个人姓名,身份证以及其他一些敏感信息,看到4500W直接震惊,其余稍微截图示意下吧。
其余危害信息只截取部分作为证明。

漏洞证明:

1111.png

db.png

db2.png

4000W代理信息.png

xinxi.png

xinxi1.png

xinxi2.png

xinxi3.png

xinxi4.png

#jdbc.driverClassName=oracle.jdbc.driver.OracleDriver
#jdbc.url=jdbc:oracle:thin:@10.100.1.183:1521:zhanyedb
#jdbc.username=ebTVeOriToU=
#jdbc.password=ebTVeOriToU\=
jdbc.driverClassName=oracle.jdbc.driver.OracleDriver
jdbc.url=jdbc:oracle:thin:@10.100.8.19:1521:mobile
jdbc.username=ebTVeOriToU=
jdbc.password=ebTVeOriToU\=
<url>jdbc:oracle:thin:@10.100.1.215:1521/bonus</url>
<driver-name>oracle.jdbc.OracleDriver</driver-name>
<properties>
<property>
<name>user</name>
<value>bonus</value>
</property>
</properties>
<password-encrypted>{AES}kKar8ef947/VS0pHnoeFJf1+dOQR0lMqcxPVSbZ0YiI=</password-encrypted> bonus
<url>jdbc:oracle:thin:@10.100.1.74:1521:htl1</url>
<driver-name>oracle.jdbc.xa.client.OracleXADataSource</driver-name>
<properties>
<property>
<name>user</name>
<value>htprod</value>
</property>
</properties>
<password-encrypted>{AES}VgnE4LriOKxQeI+UhcPO0vWEveXM7CrzwPwiy1Ljw+s=</password-encrypted> htprod
<url>jdbc:oracle:thin:@10.100.2.29:1521/bidbprod</url>
<driver-name>oracle.jdbc.OracleDriver</driver-name>
<properties>
<property>
<name>user</name>
<value>ydzy</value>
</property>
</properties>
<password-encrypted>{AES}QobJCD1thIeubIwa7oSycTHILopLAFoykUWVXaPRbuk=</password-encrypted> ydzy

数据库配置

Query#0 : select t.TABLE_NAME,t.NUM_ROWS from user_tables t order by NUM_ROWS desc
TABLE_NAME
VARCHAR2 NUM_ROWS
NUMBER
MLOG$_RCCOMMMONTHRULE
MLOG$_RCAGENTCOMMISSION
MLOG$_LCCONTBANKFEE
RUPD$_RCCOMMMONTHRULE
RUPD$_RCPOLICYFEEBASICINDE
RUPD$_LCCONTBANKFEE
RUPD$_RCAGENTCOMMISSION
MLOG$_RCPOLICYFEEBASICINDE
T_CONTRACT_MASTER_BACKUP 87393955
RCAGENTCOMMISSION 46530337
LCAGENT 46330336
PRERCAGENTCOMMISSION 44585070
MVBUSINESSLOG 37822895
RCAGENTINDEXMONTH 27395302
RC_BUSINESS_LOG 23028548
RCAGENTASSESSRESULT 16861891
LCDEPT 16231761
RCAGENTASSESSDETAIL 15673544
RC_PRODUCT_FEE 8294204
T_AGENT_BACKUP 7922015
RCTEAMINDEXMONTH 6890715
RC_PRODUCT_COMMISION 5965020
LATEAMINDEXDAILY 5396642
LAAGENTINDEXDAILY 4631134
DM_RENEWLDUEPAY 4559465
RC_POLICY_FEE 4521316
RCPOLICYLOG 4239611
RC_CONTRACT_PRODUCT 3933387
RCPOLICYFEEBASICINDEX 3902894
RCPOLICYFEEBASICINDEXND 3899788
RCFEELOG 3729981
T_DEPT_BACKUP 2816683
RCPOLICYFEEPRECOMMSNAP 2788210
DMA_PERSON_RENEWAL_2 2702289
RCSTAFFADDEDRELATION 2583595
RC_CONTRACT_MASTER 2215498
LCCONTINTERMEDIARYFEE 2201055
LCCONTBANKFEE 2163755
LSTASKPROPERTIES 2042708
RCAGENTASSESS 2040835
RC_POLICY_ACKNOWLEDGEMENT 1231204
COMMMONTHAGENT 1181407
RCTEAMRELATION 1017398
RCPOLICYBASICINDEXND 987757
RCPOLICYBASICINDEX 985628
RCPOLICYPRECOMMSNAP 823884
LCCONTWAGE 565391
RCFOSTRELATION 302655
TEST 300070
LAAGENTCOMMISSION 251504
MONTHATTRATE 238825
LSTASK 189650
LAAGENTINDEXMONTH 175156
LATEAMINDEXMONTH 153287
D_AGENTGROUP 149772
RCAGENTASSESSDATE 145732
T_AGENT 138526
LCCONTSINGLEFEE 125287
V_SELFINSU1 118568
HT_AGENT_MONITOR_RELATION 94725
LABANKINDEX 84840
AGENTBONUSFLAG 77304
HT_AGENT_CHANGE_TRACE 61827
LCCONTNCALC 55944
RCCOMMMONTHRULE 48213
T_DEPT 47658
LAAGENTCOMCHARGE 41427
LAINTERMEDIARYINDEX 24633
RCFOSTRELATIONCANCEL 23432
AGENTIDCONVERT 22863
T_BANK 17464
LCDMCONTBANKWCALC 15750

数据库结构

http://219.143.162.216:7002/ht_server/1.jspx 9635789

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2016-01-22 09:06

厂商回复:

非常感谢,我们马上处理

最新状态:

暂无


漏洞评价:

评价