漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2013-09-17: 细节已通知厂商并且等待厂商处理中
2013-09-22: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
注入漏洞
详细说明:
Target: http://www.enkj.com/fastlogin/weibo/return_url.asp?id=
Host IP: 210.14.139.86
Web Server: Microsoft-IIS/7.5
Powered-by: ASP.NET
DB Server: MsSQL with error
Resp. Time(avg): 46 ms
Current User: dbo
Sql Version: Microsoft SQL Server 2005 - 9.00.5000.00 (X64)
Dec 10 2010 10:38:40
Copyright (c) 1988-2005 Microsoft Corporation
Enterprise Edition (64-bit) on Windows NT 6.1 (Build 7600: )
Current DB: freehost
System User: FreeHost
Host Name: WIN-D28TIGB6TFH
Server Name: WIN-D28TIGB6TFH
master
tempdb
model
msdb
freehost
db_cms
newcloud
MainENKJ
guanjiatest
distribution
漏洞证明:
Target: http://www.enkj.com/fastlogin/weibo/return_url.asp?id=
Host IP: 210.14.139.86
Web Server: Microsoft-IIS/7.5
Powered-by: ASP.NET
DB Server: MsSQL with error
Resp. Time(avg): 46 ms
Current User: dbo
Sql Version: Microsoft SQL Server 2005 - 9.00.5000.00 (X64)
Dec 10 2010 10:38:40
Copyright (c) 1988-2005 Microsoft Corporation
Enterprise Edition (64-bit) on Windows NT 6.1 (Build 7600: )
Current DB: freehost
System User: FreeHost
Host Name: WIN-D28TIGB6TFH
Server Name: WIN-D28TIGB6TFH
master
tempdb
model
msdb
freehost
db_cms
newcloud
MainENKJ
guanjiatest
distribution
修复方案:
null
版权声明:转载请注明来源 sq0370@乌云
>
漏洞回应
厂商回应:
危害等级:无影响厂商忽略
忽略时间:2013-09-22 11:43
厂商回复:
最新状态:
暂无
