POC详情: 920b623e83868d0ef558d495dc4b6da510fcb053

来源
关联漏洞
标题: CMS Made Simple SQL注入漏洞 (CVE-2019-9053)
描述:CMS Made Simple(CMSMS)是CMSMS团队的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMSMS 2.2.8版本中存在SQL注入漏洞,该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
介绍
# CVE-2019-9053-Exploit-in-Python-3

This is an exploit used in [TryHackMe's EasyCTF](https://tryhackme.com/room/easyctf)

However the code that is installed within Kali Linux or going to exploitDB has outdated Python 2 code.

This is a rewrite of that, and some revisions were made when cracking the password's hash, since there was a bug when running with Python 3.

This is so that you can run the EasyCTF the way it's intended to without any errors.
文件快照
 [4.0K]  /data/pocs/920b623e83868d0ef558d495dc4b6da510fcb053
├── [6.3K]  46635.py
└── [ 454]  README.md

0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。