sql injection time within the network referred to in the permeate

1. SQL Injection Vulnerability

Vulnerability Level:

High-risk

Vulnerability Location:

Basic information> flood water level Messaging>

Vulnerability Description:

A malicious attacker can inject SQL injection vulnerabilities construct SQL statements, returns a specific error message to the server to get information of value, and even tamper with the contents of the database and put 

Vulnerability Verification:

 

 

 

 

 

 Although he did not get too many useful things, but basically decided that there sql injection, given the time factor does not take sqlmap run, to which it

 Advice:

  1. Vulnerability incoming parameter generation module is checked for validity, incoming parameters defined
  2. When the user enters character limit, immediately turned to a custom error page, the server can not use the default error output
  3. Above label dangerous characters filtered prohibited ; incoming ( ', ", +,% , &, <>, (),, and, select , etc.) special characters
  4. Information stored in the encrypted database
  5. When the database link and access the data, using parameterized query link access

Guess you like

Origin www.cnblogs.com/whoami123/p/12166590.html