漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0160001
漏洞标题:苏州广电网多处漏洞(弱口令,sql注射)
相关厂商:csztv.cn
漏洞作者: 路人甲
提交时间:2015-12-10 15:33
修复时间:2016-01-23 15:16
公开时间:2016-01-23 15:16
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-10: 厂商已经确认,细节仅向厂商公开
2015-12-20: 细节向核心白帽子及相关领域专家公开
2015-12-30: 细节向普通白帽子公开
2016-01-09: 细节向实习白帽子公开
2016-01-23: 细节向公众公开
简要描述:
首页!
详细说明:
漏洞证明:
Database: bang
[76 tables]
+----------------------------+
| adcenter |
| att_daka_detail_his |
| att_daka_his |
| att_leave |
| att_log_his |
| att_members |
| att_task |
| att_train |
| att_train_user |
| att_usertask |
| bang_action_prize |
| bang_candidate |
| bang_capta |
| bang_changelog |
| bang_event |
| bang_group |
| bang_hostip |
| bang_mob_dinfo |
| bang_mob_gg |
| bang_module |
| bang_news |
| bang_node |
| bang_option_his |
| bang_page_option |
| bang_page_option_bak |
| bang_page_option_old |
| bang_page_result |
| bang_page_title |
| bang_phone |
| bang_phone_tamp |
| bang_poll |
| bang_poll_info |
| bang_poll_info_temp |
| bang_poster |
| bang_rank_news |
| bang_rank_trade |
| bang_sessions |
| bang_sign |
| bang_smsinfo |
| bang_smsinfo_back |
| bang_survey |
| bang_tjinfo |
| bang_tjtype |
| bang_user |
| bang_user_action |
| bang_user_group |
| bang_user_group_permission |
| bang_user_permission |
| class |
| contable |
| host13_image |
| host13_news |
| host_image |
| host_news |
| intorder |
| poll_ads |
| poster |
| qauserinfo |
| range |
| test_test |
| torder |
| trade |
| userinfo |
| wy_action |
| wy_capta |
| wy_student |
| wy_vote |
| yd_daka_detail_his |
| yd_daka_his |
| yd_leave |
| yd_log_his |
| yd_members |
| yd_task |
| yd_train |
| yd_train_user |
| yd_usertask |
+----------------------------+
修复方案:
。。。。。
版权声明:转载请注明来源 路人甲@乌云
漏洞回应
厂商回应:
危害等级:低
漏洞Rank:2
确认时间:2015-12-10 15:35
厂商回复:
系统已经基本不用了,但是还是谢谢提出。
最新状态:
暂无