Difference between revisions of "一卡通信息管理系統 SQL注入漏洞"
From PwnWiki
(Created page with "<languages /> <center> {| style="border: 2.0px solid grey; background: #b3ff9c;" width="85%" | align="center" width="60px"| link=|55px | align="center" |''...") |
(Marked this version for translation) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 4: | Line 4: | ||
{| style="border: 2.0px solid grey; background: #b3ff9c;" width="85%" | {| style="border: 2.0px solid grey; background: #b3ff9c;" width="85%" | ||
| align="center" width="60px"| [[File:Check.png|link=|55px]] | | align="center" width="60px"| [[File:Check.png|link=|55px]] | ||
| − | | align="center" |'''<translate>該漏洞已通過驗證</translate>''' | + | | align="center" |'''<translate><!--T:1--> 該漏洞已通過驗證</translate>''' |
------ | ------ | ||
| − | <small><translate>本頁面的EXP/POC/Payload經測試可用,漏洞已經成功復現。</translate></small> | + | <small><translate><!--T:2--> 本頁面的EXP/POC/Payload經測試可用,漏洞已經成功復現。</translate></small> |
|} | |} | ||
</center> | </center> | ||
<translate> | <translate> | ||
| − | ==漏洞信息== | + | ==漏洞信息== <!--T:3--> |
</translate> | </translate> | ||
<translate> | <translate> | ||
| + | <!--T:4--> | ||
此系統存在默認弱口令,以及前台sql注入。 | 此系統存在默認弱口令,以及前台sql注入。 | ||
</translate> | </translate> | ||
| Line 21: | Line 22: | ||
<translate> | <translate> | ||
| − | ==弱口令== | + | ==弱口令== <!--T:5--> |
</translate> | </translate> | ||
<pre> | <pre> | ||
| Line 30: | Line 31: | ||
<translate> | <translate> | ||
| − | ==SQL注入== | + | ==SQL注入== <!--T:6--> |
</translate> | </translate> | ||
<translate> | <translate> | ||
| + | <!--T:7--> | ||
用戶名處存在SQL注入漏洞,使用BurpSuite插件利用(在用戶名處加入<code>*</code>)。 | 用戶名處存在SQL注入漏洞,使用BurpSuite插件利用(在用戶名處加入<code>*</code>)。 | ||
</translate> | </translate> | ||
| + | |||
https://github.com/c0ny1/sqlmap4burp-plus-plus/ | https://github.com/c0ny1/sqlmap4burp-plus-plus/ | ||
<translate> | <translate> | ||
| − | ==參考== | + | |
| + | ==參考== <!--T:8--> | ||
</translate> | </translate> | ||
https://mp.weixin.qq.com/s/zxxOWSYgzY-z8GbBxEP_TQ | https://mp.weixin.qq.com/s/zxxOWSYgzY-z8GbBxEP_TQ | ||
Latest revision as of 09:56, 5 July 2021
| 該漏洞已通過驗證
本頁面的EXP/POC/Payload經測試可用,漏洞已經成功復現。 |
漏洞信息
此系統存在默認弱口令,以及前台sql注入。
FOFA
"Content/images/login/logo.png" && "/Content/js/core/knockout-2.2.1.js"
弱口令
super 1234