neoone9 / jsql-injection

Automatically exported from code.google.com/p/jsql-injection
0 stars 0 forks source link

cant exploit this . #2

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
[link removed]

http://url/page.php?id=3
exploit link: http://url/page.php?id=3)' order by 9999999999-- /*
What steps will reproduce the problem?
1. paste link 
2. press COnnect =]
3. :v

What is the expected output? What do you see instead?
nothing

What version of the product are you using? On what operating system?
0.4

Original issue reported on code.google.com by ron190@ymail.com on 28 May 2013 at 8:03

GoogleCodeExporter commented 8 years ago
jSQL uses the parameter value provided by user, in example 3 (id=3), and it 
expects this value to either work properly or fail, but jSQL will not modify 
the parameter value into another one, like for example 3' (note the quote in 
id=3').
A value of 3)', while very unexpected, could be paste into the address bar if 
you know it's the proper value: 
http://url/page.php?id=3)'

But if you wonder what is the working value (is it id=3 or id=3' or id=3)' 
etc?), instead you could let jSQL find the best one automatically, remove the 
parameter value and paste the link like this:
http://url/page.php?id=

jSQL will test the following parameter value in the automatic mode: 0 0' ' -1 1 
" -1)
From source code, at line 349 of InjectionModel.java:
http://code.google.com/p/jsql-injection/source/browse/src/com/jsql/mvc/model/Inj
ectionModel.java#342

Original comment by ron190@ymail.com on 28 May 2013 at 8:29

GoogleCodeExporter commented 8 years ago
working with this link
http://url/page.php?id=3)'

Original comment by hoang9...@gmail.com on 28 May 2013 at 8:37