An SQL injection vulnerability exists in a Hisense system.
An SQL injection vulnerability exists in a Hisense system.
Http://sup.hisense-plaza.com/scmsup/default0.aspx
Hisense Supply Chain Management System
Two tb_UserCode and tb_Exml parameters at the password retrieval are injected.
Http://sup.hisense-plaza.com/scmsup/MaintnPasswd.aspx
POST http://sup.hisense-plaza.com/scmsup/MaintnPasswd.aspx HTTP/1.1
Host: sup.hisense-plaza.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv: 18.0) Gecko/20100101 Firefox/18.0
Accept: text/html, application/xhtml + xml, application/xml; q = 0.9, */*; q = 0.8
Accept-Language: zh-cn, zh; q = 0.8, en-us; q = 0.5, en; q = 0.3
Accept-Encoding: gzip, deflate
Referer: http://sup.hisense-plaza.com/scmsup/MaintnPasswd.aspx
Cookie: ASP. NET_SessionId = na4ah045guj0kb55jrhjzq45; CNZZDATA2268540 = cnzz_eid % 3D188449680-1415148715-% 26 ntime % 3D1415148715
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 219
_ VIEWSTATE = % blank % 3D & __ EVENTVALIDATION = % blank % 2 BOQWoDI % 2BQzXkU66QIENdSw3z & tb_UserCode = 1 & tb_Exml = 2 & btnLogin = + % B2 % E9 % D5 % d2 % C3 % DC % C2 % EB +
Take tb_UserCode as an Example
Solution:
Filter