### 简要描述:
欧朋网数据库被直接下载,用户信息泄露,有用户名、邮箱、手机号,密码(已破解了一些),QQ号等。
### 详细说明:
下载地址:
http://r.oupeng.com/tmp/users.sql
下载后不想麻烦建个表了,用记事本将就着看:
表结构:
CREATE TABLE `users` (
`uid` int(10) unsigned NOT NULL AUTO_INCREMENT,
`username` char(20) NOT NULL,
`password` char(64) NOT NULL,
`email` char(125) NOT NULL,
`email_state` tinyint(1) NOT NULL DEFAULT '0',
`mobile` char(11) NOT NULL,
`sitename` char(50) NOT NULL,
`siteurl` char(200) NOT NULL,
`qq` char(16) NOT NULL,
`msn` char(255) NOT NULL,
`telephone` char(20) NOT NULL,
`identity` tinyint(1) NOT NULL,
`regtime` int(10) unsigned NOT NULL,
`regip` char(30) NOT NULL,
`verify_state` tinyint(1) NOT NULL DEFAULT '0',
`verify_user` char(20) NOT NULL,
`verify_time` int(10) unsigned NOT NULL,
`stat_type` tinyint(1) unsigned NOT NULL DEFAULT '1',
`pay_type` tinyint(4) NOT NULL DEFAULT '1',
`threshold_value` tinyint(2) unsigned NOT NULL DEFAULT '1' COMMENT '氓藛陇忙鈥撀┧溾偓氓鈧济λ溌ヂ惵γぢ柯︹€澛?:忙艙陋盲驴庐忙鈥澛姑寂?盲驴庐忙鈥澛?,
`user_type` tinyint(4) unsigned NOT NULL COMMENT '莽鈥澛λ喡访甭幻ヅ锯€姑寂?盲赂陋盲潞潞,2氓鈥βヂ徛?,
`business_id` int(11) unsigned NOT NULL COMMENT '氓鈥⑩€犆ヅ犅d',
`source` tinyint(1) NOT NULL DEFAULT '0' COMMENT '来源 0未知,1公司,2个人',
PRIMARY KEY (`uid`),
UNIQUE KEY `username` (`username`)
) ENGINE=MyISAM AUTO_INCREMENT=4752 DEFAULT CHARSET=utf8;
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201308/281828356d9ba219a5e454ecc317635afefed739.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201308/281828356d9ba219a5e454ecc317635afefed739.png)
暂无评论