After receiving the parameter ‘id’, the code did not perform any pre-compilation or filtering operations, and simply concatenated it directly into the SQL statement, resulting in a SQL injection vulnerability.
There are 11 vulnerability points depending on the value of the “type” parameter.
2.Vulnerability exploitation
First, log in to the backend using the administrator account and password.
Successfully verified the existence of time blind injection vulnerability and boolean blind injection vulnerability.
1
sqlmap -r '/home/qfbsz/111/daima/vka/sql.txt' --batch -p id
SSRF Vulnerability
1.Vulnerability Analysis
Vulnerability file:/admin/wholesale.php
This code does not perform any security processing on the URL parameters after receiving them, and directly uses the getbody function to make the request, resulting in an SSRF vulnerability.
2.Vulnerability exploitation
First, log in to the backend using the administrator account and password.
During the process of obtaining the “S_title” parameter, the “add” operation and the “edit” operation do not convert it into HTML entities and directly concatenate it into the JavaScript code.