Waxa program injection vulnerability and configuration information leakage and repair

Source: Internet
Author: User
Tags domain name registration free domain name registration

 

Brief description:

Program problems cause information leakage. You can purchase some items in combination with the form.

Detailed description:

It was early in the morning that they did not deal with it. It was said that it was the technology of the finished supermarket for them.

Https://sudu.cn/website/ appears on this page, in fact iframe has a http://web.sudu.cn/webmall/

Then this finished supermarket website can inject, http://web.sudu.cn/webmall/detail.php? Id = fuck 'This background is not important http://web.sudu.cn/admin.php

After reading the key cracking, you can go to phpweb.net to view your account information, and then purchase the website with your account.

 

On the other hand, I boast about the best free domain name registration in the history on Huaxia mingwang .... Yes. tk rice was in dot a few years ago. tk can be registered. In fact, when the user spends a few cents (Huaxia mingwang is not free, although it is said) to register a tk meter, the domain name is managed there, there is a function to send a registration letter to the host's mailbox, where the get method is used for plaintext sending ....

Api. domainshare. tk/resend_email.json? Email = webmaster % 40bigwww.com & password = feishukeji *** & domainname = muingrong. tk & enduseremail = admin % 40qq.com

 

 

 

 

A lot of nonsense. In fact, for these top 10 hosts in the country, it is good to have such account and password information as multiple collection points. As for the good news, you know!

Proof of vulnerability:

Database error: Invalid SQL: select * from pwn_webmall_spool where id = 'fuck''

 

MySQL Error: 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''fuck ''' at line 1)

 

#0 dbbase_ SQL-> halt (Invalid SQL: select * from pwn_webmall_spool where id = 'fuck') called at [/home1/vhost/vh469782/www/mongodes/db. inc. php: 54] #1 dbbase_ SQL-> query (select * from {P} _ webmall_spool where id = 'fuck '') called at [/home1/vhost/vh469782/www/webmall/module/WebMallTempDetail. php: 41] #2 WebMallTempDetail () called at [/home1/vhost/vh469782/www/DES/common. inc. php: 551] #3 printpage () called at [/home1/vhost/vh469782/www/webmall/detail. php: 11]

Solution:

After-sales problems can be solved quickly. Will someone answer the call?

 

 

Author piaoye @ wooyun

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.