Brief description:
Program problems cause information leakage. You can purchase some items in combination with the form.
Detailed description:
It was early in the morning that they did not deal with it. It was said that it was the technology of the finished supermarket for them.
Https://sudu.cn/website/ appears on this page, in fact iframe has a http://web.sudu.cn/webmall/
Then this finished supermarket website can inject, http://web.sudu.cn/webmall/detail.php? Id = fuck 'This background is not important http://web.sudu.cn/admin.php
After reading the key cracking, you can go to phpweb.net to view your account information, and then purchase the website with your account.
On the other hand, I boast about the best free domain name registration in the history on Huaxia mingwang .... Yes. tk rice was in dot a few years ago. tk can be registered. In fact, when the user spends a few cents (Huaxia mingwang is not free, although it is said) to register a tk meter, the domain name is managed there, there is a function to send a registration letter to the host's mailbox, where the get method is used for plaintext sending ....
Api. domainshare. tk/resend_email.json? Email = webmaster % 40bigwww.com & password = feishukeji *** & domainname = muingrong. tk & enduseremail = admin % 40qq.com
A lot of nonsense. In fact, for these top 10 hosts in the country, it is good to have such account and password information as multiple collection points. As for the good news, you know!
Proof of vulnerability:
Database error: Invalid SQL: select * from pwn_webmall_spool where id = 'fuck''
MySQL Error: 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''fuck ''' at line 1)
#0 dbbase_ SQL-> halt (Invalid SQL: select * from pwn_webmall_spool where id = 'fuck') called at [/home1/vhost/vh469782/www/mongodes/db. inc. php: 54] #1 dbbase_ SQL-> query (select * from {P} _ webmall_spool where id = 'fuck '') called at [/home1/vhost/vh469782/www/webmall/module/WebMallTempDetail. php: 41] #2 WebMallTempDetail () called at [/home1/vhost/vh469782/www/DES/common. inc. php: 551] #3 printpage () called at [/home1/vhost/vh469782/www/webmall/detail. php: 11]
Solution:
After-sales problems can be solved quickly. Will someone answer the call?
Author piaoye @ wooyun