EOMS password retrieval vulnerability + SQL Injection affects provincial core network management support systems of China Telecom, mobile and Unicom Operators

Source: Internet
Author: User

EOMS password retrieval vulnerability + SQL Injection affects provincial core network management support systems of China Telecom, mobile and Unicom Operators

It is said that the system was issued by the headquarters of the three major operators to the provincial level for monitoring the provincial core network support management system.

Detailed description:

Tests by mobile, telecom, and Unicom companies in a province found that EOMS exists, using a support system developed by java. Although mobile deleted the password retrieval function from the logon page, other carriers still knew the page address.

Password retrieval design features:

1. Enter the correct user name;

2. Send the verification code to your mobile phone;

3. Enter the verification code to reset.

A. The vulnerability starts when you enter a user name. when you enter a user name that does not exist, the system prompts that the user does not exist. The correct user name can be guessed here;

B. After the correct user name is entered, the system sends the verification code to the user's mobile phone. There are two types of attacks. One is that the verification code is directly returned to the page through the hidden tag, you can view the source code. Second, the verification code is too simple and has only four digits;

C. After resetting any user password, log on to the console and find a query box. The SQL injection vulnerability exists. Because the EOMS system is the core network monitoring and data collection system of operators, all systems share a database. In this case, any system has the SQL injection and Arbitrary File Upload vulnerabilities, this directly causes data leakage on the core database server.

D. The system has the Arbitrary File Upload Vulnerability in the ticket submission system. In combination with SQL injection, the uploaded file path can be found, resulting in getwebshell. This affects server security.

Proof of vulnerability:

Vulnerability proof. The following is only proof of two of the above two problems.

1. password retrieval vulnerability.

Direct Access: http://xxx.xxx.xxx.xxx: 8080/eoms/loginUserid. jsp to retrieve the password, enter the correct user name, the prompt that the verification code is successfully sent. Right-click the source code to reset the user password.
 



2. SQL injection. Find a form at will.
 

 

Solution:

Patch

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.