乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-29: 积极联系厂商并且等待厂商认领中,细节不对外公开 2016-03-13: 厂商已经主动忽略漏洞,细节向公众公开
RT。
http://rank.4006666688.com/list/?subcgid=4
http://brand.4006666688.com/brandlist/?blimit=0
两个注入点,虽然不是root用户,但拥有root权限,可os shell,可惜的是没找到绝对路径..
[*] jiankongbao [2]: password hash: *025343102C10F95698FBF8CFBEBD0D990B481CD3 password hash: *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B[*] mrbean2011 [1]: password hash: *096B0D933A76D1050DD4A305F8FDAA1513CDEA67[*] postfix [1]: password hash: *06C8F6BE0991A9B5FB458F21B7F676135F2B5D30[*] root [3]: password hash: *06C8F6BE0991A9B5FB458F21B7F676135F2B5D30 password hash: *33E0762B574AF0FEB01F6B5410648D3C62C6C017 password hash: *82090B09E473FA00F6F552AF07C52068CFAF94B7
二十一万条用户数据
过滤
未能联系到厂商或者厂商积极拒绝
漏洞Rank:15 (WooYun评价)