POC详情: 04a727b0855ae61708a19f225d807f664d4121aa

来源
关联漏洞
标题: Online Shopping Portal SQL注入漏洞 (CVE-2024-9326)
描述:Online Shopping Portal是Anuj Kumar个人开发者的一个开源的在线购物门户。 Online Shopping Portal 2.0版本存在SQL注入漏洞,该漏洞源于Admin Panel组件的/shopping/admin/index.php页面的username参数包含一个SQL注入问题。
描述
This PoC script is designed to verify the presence of CVE-2024-9326, a high SQL Injection vulnerability in PHPGurukul Online Shopping Portal v2.0. It automates the exploitation process to determine if the target web application is vulnerable, allowing security professionals to assess and confirm the flaw's existence.
介绍
# CVE-2024-9326 PoC Exploit Script
This PoC script is designed to verify the presence of CVE-2024-9326, a high SQL Injection vulnerability in PHPGurukul Online Shopping Portal v2.0. It automates the exploitation process to determine if the target web application is vulnerable, allowing security professionals to assess and confirm the flaw's existence.
文件快照

[4.0K] /data/pocs/04a727b0855ae61708a19f225d807f664d4121aa ├── [1.0K] LICENSE ├── [ 354] README.md └── [3.0K] sqli_loginExploit.py 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。