Hi Emiliano,

On 24 April 2011 22:21, Emiliano Bazaes <emili...@7espejos.com> wrote:
> ...
> Here's this poc provided in the advisory:
>
> http://[host]/wp-content/plugins/ajax-category-dropdown/includes/dhat-ajax-cat-dropdown-request.php?admin&category_level=2&category_id=1%20union%20select%201,user%28%29,3,4,5,6,7,8,9,version%28%29%20--%201
>
> As you can see there's a 10 columns UNION, of which columns 2 and 10 are
> rendered on the page; so when you try the above proof-of-concept on a
> vulnerable target it should render a single item dropdown box in the format:
>
> db_user (db_version)
>
> However, I couldn't seem to be able to exploit it via sqlmap
> ...

The detection engine fails to detect this specific UNION query SQL
injection because the HTTP response bodies for valid and invalid
number of injected columns differ very little. In order to avoid this
problem, you can run sqlmap with --text-only switch, where only the
proper text of the response bodies are considered for
matching/comparison (by excluding HTML tags, scripts, etc. - see
user's manual for details).

Regards,
Bernardo and Miroslav


-- 
Bernardo Damele A. G.

E-mail / Jabber: bernardo.damele (at) gmail.com
Mobile: +447788962949 (UK 07788962949)
PGP Key ID: 0x05F5A30F

------------------------------------------------------------------------------
Fulfilling the Lean Software Promise
Lean software platforms are now widely adopted and the benefits have been 
demonstrated beyond question. Learn why your peers are replacing JEE 
containers with lightweight application servers - and what you can gain 
from the move. http://p.sf.net/sfu/vmware-sfemails
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to