Apabi图书系统多个参数MSSQL注入漏洞

2015-03-23T00:00:00
ID SSV:95492
Type seebug
Reporter Root
Modified 2015-03-23T00:00:00

Description

简要描述:

详细说明:

厂商:

http://gw.apabi.com/ 北京方正阿帕比技术有限公司

SQL注入点:

/netlinkhandler.asp?lang=gb&DocGroupID=**&FieldID=**&FieldName=Creator&FieldType=1&QueryValue=****&Repeatable=True 其中:DocGroupID、FieldID这2个参数都是存在SQL注入的

互联网自动采集案例5枚:

http://202.117.24.8/dlib/netlinkhandler.asp?lang=gb&DocGroupID=2&FieldID=3&FieldName=Creator&FieldType=1&QueryValue=%C1%D6%C9%BD&Repeatable=True http://210.37.2.181/dlib/netlinkhandler.asp?lang=gb&DocGroupID=24&FieldID=516&FieldName=Creator&FieldType=1&QueryValue=%BA%A3%C4%CF%B0%AE%C0%D6%C5%AE%D7%D3%BA%CF%B3%AA%CD%C5&Repeatable=False http://202.195.177.13/ebook/netlinkhandler.asp?lang=gb&DocGroupID=2&FieldID=3&FieldName=Creator&FieldType=1&QueryValue=%BA%AB%CC%A9%C2%D7&Repeatable=True http://202.118.250.140/dlib/netlinkhandler.asp?lang=gb&DocGroupID=2&FieldID=3&FieldName=Creator&FieldType=1&QueryValue=%BB%C6%C1%F7%D0%CB%2C+%C5%A3%CA%A4%C0%FB&Repeatable=True http://202.117.122.44/dlib/netlinkhandler.asp?lang=en&DocGroupID=2&FieldID=3&FieldName=Creator&FieldType=1&QueryValue=%C8%CE%D3%F1%CC%EF+...+%5B%B5%C8%5D&Repeatable=1

漏洞证明:

由于是两个参数都存在注入漏洞我就测试这两个参数咯: 1、DocGroupID参数:

<img src="https://images.seebug.org/upload/201503/2114134965bcfa5e1df5bf7b5e1bc76d2e56162f.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">

<img src="https://images.seebug.org/upload/201503/21141359f1a5538b1237bf731525785dca90e76b.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">

2、FieldID参数:

<img src="https://images.seebug.org/upload/201503/211419328cc8672b14ec656cc09826fa8dd9207a.jpg" alt="03.jpg" width="600" onerror="javascript:errimg(this);">

<img src="https://images.seebug.org/upload/201503/2114194056ebb192f742a87f2c87b6f887d7793d.jpg" alt="04.jpg" width="600" onerror="javascript:errimg(this);">