乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-19: 细节已通知厂商并且等待厂商处理中 2015-10-22: 厂商已经确认,细节仅向厂商公开 2015-11-01: 细节向核心白帽子及相关领域专家公开 2015-11-11: 细节向普通白帽子公开 2015-11-21: 细节向实习白帽子公开 2015-12-06: 细节向公众公开
使用AWVS进行扫描,发现SQL注入地址为:mse.sogou.com/fb.php使用bp进行抓包,获得数据包
POST /fb.php HTTP/1.1Host: mse.sogou.comContent-Length: 63Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://mse.sogou.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.69 Safari/537.36 QQBrowser/9.0.3100.400HTTPS: 1Content-Type: application/x-www-form-urlencodedReferer: http://mse.sogou.com/feedback.htmlAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.8Cookie: IPLOC=CN6501; ssuid=5608463185; SUID=89E6757C2524920A0000000055E5259D; SUV=1441080733516709; CXID=A664F30C20720D170D17AE8240153CA9; _ga=GA1.2.358513459.1440741207; sct=13; GOTO=; usid=89E6757CB1D40D0A00000000561894FF; SNUID=D2BA29275B5E7D859682C1CF5CD06261; ld=No44iyllll2qLN5ylllllVYb05klllllK4guAyllllwlllllRjoll5@@@@@@@@@@; ad=QzpnSyllll2qLt1HlllllVYNsA1lllllK4guAyllllylllllRklll5@@@@@@@@@@; SMYUV=1444838583309209; VjvZ_2132_saltkey=9XhUAm1W; VjvZ_2132_lastvisit=1444900871; VjvZ_2132_visitedfid=86; VjvZ_2132_viewid=tid_821545; VjvZ_2132_sid=F9Efjz; VjvZ_2132_lastact=1444963066%09home.php%09misc; VjvZ_2132_sendmail=1; CNZZDATA5036129=cnzz_eid%3D353689111-1444902784-http%253A%252F%252Fmse.sogou.com%252F%26ntime%3D1444957686referer=iOS&content=111&qq=11111111&email=11%4011.com&ptype=mse
使用SQLmap进行注入测试,发现可以注入。可以进行脱裤操作,发现如下的库
权限有限抓不下来数据
过滤特殊字符
危害等级:中
漏洞Rank:10
确认时间:2015-10-22 16:20
感谢支持
暂无