Microsoft SQL Server SQL Injection...

- AV AC AU C I A
发布: 2024-08-31
修订: 2025-04-13

This Metasploit module can be used to escalate SQL Server user privileges to sysadmin through a web SQL Injection. In order to escalate, the database user must to have the db_owner role in a trustworthy database owned by a sysadmin user. Once the database user has the sysadmin role, the mssql_payload_sqli module can be used to obtain a shell on the system. The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息