Didi kuaidi Smart Travel platform (cangqiong) SQL Injection Vulnerability
The web interface of Didi kuaidi Smart Travel platform has the SQL injection vulnerability.
Didi fast intelligent travel platform data interface has obvious SQL injection vulnerability, such as address: http://v.kuaidadi.com/point? CityId = 1101001 & scope = city & date = 0 & dimension = distrision & num = 300 is the system's distribution statistics for Beijing.
Normally, the result is:
Vcm1hbC5qcGc = "onerror =" javascript: errimg (this); "src =" http://www.bkjia.com/uploads/allimg/160220/041F32O4-0.jpg "width =" 600 "/>
However, the system does not process the request parameters. Http://v.kuaidadi.com/point? CityId = 11010% 2701 & scope = city & date = 1 & dimension = distribute & num = 300 when using spring, the system throws all the exception content and exposes the internal table structure.
In addition, the system does not perform any parameter processing (type verification, filtering, etc.) for other interfaces and field requests. spring throws an exception.
The interface does not filter Request Parameters. All exceptions are thrown and the related table structure and content are displayed.
Solution:
Filter Request Parameters and handle exceptions with complete logic.