爱琴思邮件系统SQL注入(部分系统受此影响)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: rt ### 详细说明: 根据http://**.**.**.**/bugs/wooyun-2015-0136712进行测试发现的。 ``` POST /login.php?Cmd=login HTTP/1.1 Host: **.**.**.** Content-Length: 71 Cache-Control: max-age=0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Origin: http://**.**.**.** Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20120101 Firefox/33.0 Content-Type: application/x-www-form-urlencoded Referer: http://**.**.**.**/login.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.8 Cookie: PHPSESSID=28283054d2c8717160a08a9a8f504ef8 name=admin&domain=**.**.**.**&passwd=admin&login=-login-&language=-&Lang= ``` 参数name和domain度存在注入。(部分站点需使用tamper=space2comment绕过) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201510/091639500f3b772f2a26a028a1455eedd3c390a0.jpg" alt="aaaaaaaaaaaaaaaa111111111111111111111111.jpg" width="600"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息