请求方式:POST

影响页面:

https://www.webshell.cc/member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes

参数:username

参数测试:and 1=1

攻击细节:

username=1+and+1=1&cookietime=2592000&password=1&quickforward=yes&handlekey=ls&fastloginfield

转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/484.html