chen1sheng / weaverOA_sql_injection

泛微OA某版本的SQL注入漏洞

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

weaverOA_sql_injection

泛微OA某版本的SQL注入漏洞

POC: PS:url结尾不能有[/],例如:http://127.0.0.1:8080,不能为http://127.0.0.1:8080/

Url ending cannot have [/], for example, http://127.0.0.1:8080, not for http://127.0.0.1:8080/

pocsuite -r weaverOA_sql_injection_POC_EXP.py -u url --verify

1648651245(1)

EXP:pocsuite -r weaverOA_sql_injection_POC_EXP.py -u url --attack --command "[command]"

PS:url结尾不能有[/],例如:http://127.0.0.1:8080,不能为http://127.0.0.1:8080/

Url ending cannot have [/], for example, http://127.0.0.1:8080, not for http://127.0.0.1:8080/

1648651381(1)

免责声明

此工具仅用于学习、研究和自查。不应将其用于非法目的。使用本工具产生的一切风险与我无关!

Disclaimer

This tool is for study, research, and self-examination only. It should not be used for illegal purposes. All risks arising from the use of this tool have nothing to do with me!

About

泛微OA某版本的SQL注入漏洞


Languages

Language:Python 100.0%