SQL Injection: http://spring.sina-qd.com/more.php? Class_id = 39
Obtain the database name and other information:
Http://spring.sina-qd.com/more.php? Class_id = 39% 20and % 201 = 2% 20 UNION % 20 SELECT % ,,2, 3, CONCAT_WS % 28 CHAR % 2832,58, 32% 29, user % 28% 29, database % 28% 29, version % 28% 29% 29 --
Getting the current user, database name, and database version is actually mysql4.0, and it hurts a lot...
But fortunately, rp is good. You can guess the user table and column name. Haha
The password is in plain text.
The website has a suspicious management directory manage, and the background address is found in the G search engine.
From the account password you just obtained, go directly to the background and find the upload question ?? Bypass ?? Don't dig deep, for fear of poor impact www.2cto.com
I also found a fckeditor editor with a low version. I used to exploit the php + fck vulnerability and did not try it. Let's take a look! Someone is visiting us. Fix it now.
Solution: The problem is identified. I believe the Administrator will know how to fix it.
Copyright Disclaimer: Reprinted with the source fido