标题: [phpMyRealty <= v. 1.0.7 SQL Injection Vulnerability] 关键词: [intext:Sort By: Submission Date | Bedrooms | Bathrooms | Price (ASC) | Price (DESC)] 作者: [H4T$A] 下载: [http://HdhCmsTestphpmyrealty测试数据/] 版本: [v. 1.0.7] # |Contact:newboy62@live测试数据 #Gr33tz f0r th3 >> best egyption hacker >>> H4T$A ||========================================================================================= 本问题影响该程序所有版本
Exploit : http://HdhCmsTest2cto测试数据 /search.php?seed=640' 用 Haivj等SQL注射工具就简单了
remember you will change the link to >> ||search.php?seed=-640||before start using Haivj :)
修复:过滤 search.php页面 seed参数输入
查看更多关于phpMyRealty <= v. 1.0.7 SQL注射缺陷及修复 - 网站安的详细内容...