某图书馆检索系统通用SQL注射

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: ``` Google:inurl:/opac/index.jsp ``` 在以及单位这里抓包 [<img src="https://images.seebug.org/upload/201508/12200850a8540078fcf50f67b2b4e4c0e7ee2159.png" alt="QQ截图20150812200806.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/12200850a8540078fcf50f67b2b4e4c0e7ee2159.png) ``` GET /lt/dzgl/dzxxgl/getejdw.jsp?yjdw=00000030 HTTP/1.1 Accept: */* Accept-Language: zh-CN User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/8.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729) Accept-Encoding: gzip, deflate Host: **.**.**.**:8070 Proxy-Connection: Keep-Alive Cookie: JSESSIONID=abc9m9iak5dpP_fybRH8u ``` 然后放进sqlmap跑即可 ### 漏洞证明: [<img src="https://images.seebug.org/upload/201508/1220314805b33ca8efa851449e62a750b4814c26.png" alt="QQ截图20150812201904.png" width="600"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息