Several SQL injection and Permission Bypass vulnerabilities in Lenovo sub-station and repair

Source: Internet
Author: User
Tags lenovo

Http://www.lenovo-cw.com/cw.do? Actions = infoList & channel = 3 & columns = 2
Blind injection vulnerability ./
Proof of vulnerability:
 
 
Http://www.lenovo-cw.com/cw.do? Actions = infoList & channel = 4 & columns = 1
 
Expecting ''', found ''[select a from com. lenovo. cw. entity. infoIssue a where 1 = 1 and. channel = 4 and. columns = 1' and. state = 1 order by. createTime desc]; nested exception is org. hibernate. queryException: expecting ''', found ''[select a from com. lenovo. cw. entity. infoIssue a where 1 = 1 and. channel = 4 and. columns = 1' and. state = 1 order by. createTime desc]
Solution:
Reference: OWASP 09/13/2009
Https://www.owasp.org/index.php/Blind_ SQL _Injection


2.

The e-learning substation login module has the POST injection vulnerability.
Vulnerability address: http://e-learning.lenovo.com.cn/user/login
Vulnerability method: POST
Data Type: String
Database: Lenovo
Trigger parameter www.2cto.com
UserLogin [password] = WCRTESTINPUT000001 & UserLogin [verifyCode] = WCRTESTINPUT000002 & UserLogin [rememberMe] = 0 & yt1 = login & UserLogin [username] = 11111111
Proof of vulnerability:
 
 

 




Solution:
See owasp SQL Injection 12/6/2011 version
Https://www.owasp.org/index.php/ SQL _Injection

3.

Brief description:
SAP J2EE Engine Permission Bypass, Directory Traversal
Detailed description:
Web applications traverse directories through SAP, bypass account logon restrictions, and access internal information systems.
Proof of vulnerability:
Http://ec1.lenovo.com.cn/home/eppcsr/ecall/jsp/customer/upload/upload.jsp
Http://ec1.lenovo.com.cn/home/eppcsr/ecall/jsp/customer/
Http://ec1.lenovo.com.cn/wsnavigator/jsps/
Solution:
Contact a third-party application vendor
 
Author Bincker

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.