代码拉取完成,页面将自动刷新
Products: SEMCMS PHP
Vulnerability type: Time blind injection
Vulnerability hazard: Sensitive database information can be obtained
At Site background directory SQL Injection exists for the ID paramter in SEMCMS_InquiryView.php,which is scanned and replicated using this project python script.
python poc.py url "cookie"
example:
python poc.py http://www.xxx.com/bJRbbi_Admin/SEMCMS_InquiryView.php "scusername=%E6%80%BB%E8%B4%A6%E5%8F%B7; scuseradmin=Admin; scuserpass=c4ca4238a0b923820dcc509a6f75849b"
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。