中国电信互联星空某站SQL注入漏洞
注入点:http://v.sn.vnet.cn/search/list.jsp
搜索的地方没进行过滤。
进行抓包。
POST /search/list.jsp HTTP/1.1
Host: v.sn.vnet.cn
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://v.sn.vnet.cn/search/list.jsp
Cookie: NewLogin=35040012$c+WOKXs39d6H5APnQvhzZfpBn7SI5fUNxTxt+JfNY3KkrbjB1ekxiE3Ag7rdmQhHwNYy8tdFilxcp/DuFGJ0rinH2MCmjVeXaNU2Jz1Sw9p/VPwEMGuW+RZsfJtl6oDCq1WtLUCtwkixxg+Mmcvm0ivbB2RHE0GlKP9dX13C41DZdOmPEudjRCAM1Wo6QgdDUvKLjFcQNsIcF6bpItrwcg==; VNETCENTER_USER_VALIDATOR_SP=nMMrOvGAQ/vttiIDcQfc9Ad7t1BBZ3/yB6W4FflOggQ=; lzstat_uv=215774239994086562|2710605; lzstat_ss=2607815262_1_1402949095_2710605; JSESSIONID=9DDFD4BC8C443085B93DC131F8341B9E
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 134
HistoryString=&QueryAction=%23Search&keyword=1111111&optionKey=1&x=19&y=12&orderByIndex=0&redirPageNo1=1&orderByIndex=0&redirPageNo2=1
拿SLQMAP进行跑
版权与免责声明:
凡注明稿件来源的内容均为转载稿或由网友用户注册发布,本网转载出于传递更多信息的目的;如转载稿涉及版权问题,请作者联系我们,同时对于用户评论等信息,本网并不意味着赞同其观点或证实其内容的真实性;