-
-
[转帖]Php Nuke 8.x.x Blind SQL Injection Vulnerability
-
发表于: 2010-8-11 12:21 2558
-
Poc :modules\Web_Links\index.php line:223
function Add($title, $url, $auth_name, $cat, $description, $email) {
global $prefix, $db, $user;
$url = filter($url, "nohtml");
$result = $db->sql_query("SELECT url from ".$prefix."_links_links where
url='$url'");
$numrows = $db->sql_numrows($result);
if ($numrows>0) {......
######################################################################
#Bug : 804K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8$3c8#2L8r3g2K6i4K6u0W2M7r3S2H3i4K6y4r3L8X3q4E0k6g2)9K6c8q4N6W2j5W2)9#2k6V1I4A6L8X3E0K6i4K6t1$3L8q4)9#2k6X3!0H3i4K6y4p5b7h3c8V1i4K6t1$3N6i4u0D9i4K6y4p5M7%4q4D9 Injection
######################################################################
function Add($title, $url, $auth_name, $cat, $description, $email) {
global $prefix, $db, $user;
$url = filter($url, "nohtml");
$result = $db->sql_query("SELECT url from ".$prefix."_links_links where
url='$url'");
$numrows = $db->sql_numrows($result);
if ($numrows>0) {......
######################################################################
#Bug : 804K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8$3c8#2L8r3g2K6i4K6u0W2M7r3S2H3i4K6y4r3L8X3q4E0k6g2)9K6c8q4N6W2j5W2)9#2k6V1I4A6L8X3E0K6i4K6t1$3L8q4)9#2k6X3!0H3i4K6y4p5b7h3c8V1i4K6t1$3N6i4u0D9i4K6y4p5M7%4q4D9 Injection
######################################################################
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
赞赏
雪币:
留言: