Json Inject


Http MIME Type

MIME:"application/json"

Syntax

: is 'K:V' . It is the smallest unit of JSON.

, is separate.

[ ] is array.

{ } is object.

Json Value

number or float {"age":30}

string {"name":"lisi"}

boolean {"flag":true}

array {"sites":["name":"yang","name":"ming"]}

object {"sites":{["name":"yang","name":"ming"],"sex":man}}

null { "runoob":null }

example:

{
  "users_1": {
    "user_2": [
      {
        "id": "1",
        "username": "admin",
        "passwd": "admin888"
      },
      {
        "id": "2",
        "username": "root",
        "passwd": "root123"
      },
      {
        "id": "3",
        "username": "system",
        "passwd": "system456"
      }
    ]
  }
}

Code Audit PHP

<?php
  header('content-type:text/html;charset=utf-8');
  if(isset($_POST['json'])){
    $json_str=$_POST['json'];
    $json=json_decode($json_str);
    if(!$json){
      die('JSON文档格式有误,请检查');
    }
   //var_dump($json);
  $users_1 = $json['users_1'];
  //var_dump($users_1);
  $user_2=$users_1['user_2'];
  //var_dump($user_2);
  $array0=$user_2[0];
  $username=$array0['username'];
  echo $username;
    
    $mysqli=new mysqli();
    $mysqli->connect('localhost','root','root');
    if($mysqli->connect_errno){
      die('数据库连接失败:'.$mysqli->connect_error);
    }
    $mysqli->select_db('user');
    if($mysqli->errno){
      dir('打开数据库失败:'.$mysqli->error);
    }
    $mysqli->set_charset('utf-8');
    $sql="SELECT username,paawd FROM users WHERE username='{$username}'";
    $result=$mysqli->query($sql);
    if(!$result){
      die('执行SQL语句失败:'.$mysqli->error);
    }else if($result->num_rows==0){
      die('查询结果为空');
    }else {
      $array1=$result->fetch_all(MYSQLI_ASSOC);
      echo "用户名:{$array1[0]['username']},密码:{$array1[0]['paawd']}";
    }
    $result->free();
    $mysqli->close();
  }
?>

Request:
normal
1552062-20190710001925416-922625244.png

SQL Inject
1552062-20190710002033033-1709254166.png

This vulnerability is commonly used to insert some illegal data to assist other vulnerabilities, such as SQL Inject.

转载于:https://www.cnblogs.com/mysticbinary/articles/11161395.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值