乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2012-08-22: 积极联系厂商并且等待厂商认领中,细节不对外公开 2012-10-06: 厂商已经主动忽略漏洞,细节向公众公开
闲着没事干~
1.测试注入点:http://www.[马赛克].com.cn/Web/Chain/ShowHotel.aspx?Uid=80232.工具不好用,手工构造可猜解;
表
DN_CodeDescript、DN_District、DN_Unit、HT_CRSRmTp、HT_PayAccountInnHotel、HT_UnitInfo、JW_Apply、JW_ApplytoJoin、JW_BrandInfo、JW_BrandInfoCate、JW_Bus_XZ、JW_Bus_XZ_Hotels、JW_Channels、JW_ChefInfo、JW_ChefInfoCate、JW_CityInfo、JW_CompanyLink、JW_CompanyLinkClass、JW_CountryList、JW_DataVersion、JW_Department、JW_Education、JW_FormService、JW_Guest_Consultation、JW_Guest_HotelComment、JW_HotelComment、JW_InfoPicture、JW_InnHotel_NearInfo、JW_JobCate、JW_JobPosition、JW_LinkCate、JW_LinkCate、JW_MsgStatus、JW_OftenOrderHotel、JW_OftenOrderUser、JW_OperationType、JW_OrderBuyCard、JW_ProInfo、JW_ProInfoCate、JW_qykh、JW_RecType、JW_ScoreClass、JW_ScoreTrans、JW_ServiceList、JW_SiteMsg、JW_SpecOffs、JW_SpecOffsCate、JW_SpecOffsType、JW_StatisticsClass、JW_UnitMinPrice、JW_UploadFile、JW_UserMsgSite、JW_UserQPlus
部分用户信息
'1156^[email protected]^QKWFNQW48Y2N6ARM' '1157^[email protected]^57CRZ3GT2A3RLUI9' '1158^[email protected]^F5AC4G6Y4Q2AD58Q''1159^[email protected]^T5DBTLQKW544D4K7''1160^[email protected]^XUHL45YJDZW4EHZ6''1162^[email protected]^EEAEJF5AL55FJU6N''1163^[email protected]^SRD7BKJE7QR6CJNB''1164^[email protected]^XX4FJGD2TCZGUZLB''1165^[email protected]^8BRG4CCYIZ9NEH88''1166^[email protected]^TBM9FWHK6AKNBWHM' '1167^[email protected]^R2CKBC5CYYCYF8FQ''1168^[email protected]^GZ4CF7UDK693K2NA''1169^[email protected]^FR22SC3L4DNT4X8E''1170^[email protected]^D5UFEDBG7QYBWXQR''1171^[email protected]^9NMJFYTKUSGWCTN5''1172^[email protected]^Y7WMNLX6DFKKW7FX'
未能联系到厂商或者厂商积极拒绝