大汉jcms多处SQL注入一(附80个案例)

漏洞概要

缺陷编号:WooYun-2014-088684

漏洞标题:大汉jcms多处SQL注入一(附80个案例)

相关厂商:cncert国家互联网应急中心

漏洞作者:路人甲

提交时间:2014-12-31 11:05

公开时间:2015-04-02 11:21

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

Tags标签:

漏洞详情

披露状态:

2014-12-31: 细节已通知厂商并且等待厂商处理中
2015-01-03: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放(绿盟科技、唐朝安全巡航、无声信息)
2015-02-27: 细节向核心白帽子及相关领域专家公开
2015-03-09: 细节向普通白帽子公开
2015-03-19: 细节向实习白帽子公开
2015-04-02: 细节向公众公开

简要描述:

偶然间再次看到大汉网络的jcms,搜索了下该系统的漏洞,真可谓千疮百孔,而且居然全部忽略!我去!

详细说明:

不想多给出分析,直接给出漏洞点/jcms/services/WSSynchronize该服务的多个方法存在漏洞,比如wsGetWeb、wsGetColumnStyle、wsSynchronize、wsSynchronizeWithPath等,参数也是多个如,strLoginId、hasZip、strWebIds等这里用wsGetWeb方法做漏洞证明:

这里用WSockExpert v0.7抓包,并保存为wooyun.txt**.**.**.**

**.**.**.**

**.**.**.**

**.**.**.**

可以直接用SQLMAP就可以跑出数据 sqlmap.py -r wooyun.txt

sqlmap.py -r wooyun.txt --dbs

附上案例:http://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms2.5//services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**//jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms2.5/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms25/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms24/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/service/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdlhttp://**.**.**.**/jcms/services/WSSynchronize?wsdl

漏洞证明:

修复方案:

你们比我懂

漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-04-0211:21

厂商回复:

最新状态:

暂无

评价

  1. 2010-01-01 00:00 泳少 白帽子 | Rank:158 漏洞数:20)

    @U神

  2. 2010-01-01 00:00 Power 白帽子 | Rank:29 漏洞数:7)

    大汉

  3. 2010-01-01 00:00 黑暗游侠 白帽子 | Rank:1058 漏洞数:93)

    肯定U神 @U神

  4. 2010-01-01 00:00 wefgod 白帽子 | Rank:1438 漏洞数:124)

    提交原先的漏洞?

  5. 2010-01-01 00:00 U神 白帽子 | Rank:788 漏洞数:65)

    猜错了,这不是我提的,最近没有时间提

  6. 2010-01-01 00:00 wefgod 白帽子 | Rank:1438 漏洞数:124)

    @U神 你不是天天在BUTIAN吗

  7. 2010-01-01 00:00 V-King 白帽子 | Rank:15 漏洞数:1)

    危害等级:无影响厂商忽略

  8. 2010-01-01 00:00 荫僵蓝殿 白帽子 | Rank:0 漏洞数:0)

    危害等级:无影响厂商忽略

  • N/A