From ba366e9374f53cd1e500b732a850040e82710cc3 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Mon, 4 May 2020 05:01:47 +0000 Subject: [PATCH] DB: 2020-05-04 1 changes to exploits/shellcodes --- exploits/php/webapps/41564.php | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/exploits/php/webapps/41564.php b/exploits/php/webapps/41564.php index 187b3a706..2146ea445 100644 --- a/exploits/php/webapps/41564.php +++ b/exploits/php/webapps/41564.php @@ -12,8 +12,7 @@ # cf # # Three stages: -# 1. Use the SQL Injection to get the contents of the cache for current -endpoint +# 1. Use the SQL Injection to get the contents of the cache for current endpoint # along with admin credentials and hash # 2. Alter the cache to allow us to write a file and do so # 3. Restore the cache @@ -67,8 +66,7 @@ class DatabaseCondition class SelectQueryExtender { # Contains a DatabaseCondition object instead of a SelectQueryInterface - # so that $query->compile() exists and (string) $query is controlled by -us. + # so that $query->compile() exists and (string) $query is controlled by us. protected $query = null; protected $uniqueIdentifier = QID;