漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2014-01-11: 积极联系厂商并且等待厂商认领中,细节不对外公开
2014-02-25: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
rank啊
详细说明:
北青msn 存在一处sql注入
Target: http://g.ynet.com/games/plays.php?sid=74
Host IP: 114.112.90.75
Web Server: nginx
Powered-by: PHP/5.3.27
DB Server: MySQL
Current DB: webgame0880
Data Bases: information_schema
dbsync
test
webgame
webgame0880
webgame7676
Data Bases: information_schema
dbsync
test
webgame
webgame0880
webgame7676
漏洞证明:
北青msn 存在一处sql注入
Target: http://g.ynet.com/games/plays.php?sid=74
Host IP: 114.112.90.75
Web Server: nginx
Powered-by: PHP/5.3.27
DB Server: MySQL
Current DB: webgame0880
Data Bases: information_schema
dbsync
test
webgame
webgame0880
webgame7676
Data Bases: information_schema
dbsync
test
webgame
webgame0880
webgame7676
修复方案:
版权声明:转载请注明来源 Skull@乌云
>
漏洞回应
厂商回应:
未能联系到厂商或者厂商积极拒绝