Getshell (intranet penetration allowed) caused by SQL Injection in a system of Shenzhen Airlines)
Http://ecargo.shenzhenair.com: 23454/login. aspx
First, the verification code has a vulnerability. The verification code is reused.
After obtaining a verification code, you can submit it all the time without obtaining it again.
An error is reported when the user name is submitted in single quotes.
Saving the post data packet to sqlmap does not run
Then try a variety of universal passwords
1 'or 1 = 1 or '1' = '1
Common universal passwords are useless.
This statement is successfully entered in the background.
1 'or substring (password, 1, 1) = 'A' or '1' = '1
If the password field exists in the previous test, the user with the First password as a will log on.
The reason why the previous statements are not logged in is that the background will retrieve all the users and select the first user for logon.
As a result, the backend is always loading and querying, and the query crashes.
Search for injection points after entering the system
Http://ecargo.shenzhenair.com: 23454/ComplaintsAndClaims/SelectUser. aspx
Put it in sqlmap and finally ran out of a total of 20 sa Permissions
Station database Separation
Next, find an upload point.
Then the path is found here.
Webshell is obtained successfully.
Intranet ip addresses of various databases, you know
The administrator password is missing.
Solution:
Filter SQL Injection