### 简要描述: RT ### 详细说明: SQL注入文件: ``` /anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx ``` SQL注入案例: ``` http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://jmzx.xmedu.cn:9999/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://www.gxbyzx.cn:88/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://oa.w12z.com/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://www.xwgjzx.com:8888/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 ``` ### 漏洞证明: SQL注入测试一: ``` http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 ``` [<img src="https://images.seebug.org/upload/201504/07210809698b0b2dde0f54b958ff99f98701f497.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/07210809698b0b2dde0f54b958ff99f98701f497.jpg) ``` 当前用户和数据库...
### 简要描述: RT ### 详细说明: SQL注入文件: ``` /anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx ``` SQL注入案例: ``` http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://jmzx.xmedu.cn:9999/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://www.gxbyzx.cn:88/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://oa.w12z.com/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 http://www.xwgjzx.com:8888/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 ``` ### 漏洞证明: SQL注入测试一: ``` http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 ``` [<img src="https://images.seebug.org/upload/201504/07210809698b0b2dde0f54b958ff99f98701f497.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/07210809698b0b2dde0f54b958ff99f98701f497.jpg) ``` 当前用户和数据库 ``` [<img src="https://images.seebug.org/upload/201504/07210823d78eb7d4cdcc948370ff26befe7e09a0.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/07210823d78eb7d4cdcc948370ff26befe7e09a0.jpg) ``` ``` SQL注入测试二: ``` http://jmzx.xmedu.cn:9999/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 ``` [<img src="https://images.seebug.org/upload/201504/07210923a5c598700c60654e4dfe2da896b2f177.jpg" alt="03.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/07210923a5c598700c60654e4dfe2da896b2f177.jpg) ``` 当前用户和数据库 ``` [<img src="https://images.seebug.org/upload/201504/07211009caa7c0c42e910644572cf6df7649f6cf.jpg" alt="04.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/07211009caa7c0c42e910644572cf6df7649f6cf.jpg) ``` ``` SQL注入三: ``` http://www.gxbyzx.cn:88/anmai/KY_Mamage/Integrate_Select/OutlayPayout_Select_particular.aspx?id=1 ``` [<img src="https://images.seebug.org/upload/201504/07211300527cda5e982eb9a643ecfe6ee6a659d3.jpg" alt="05.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/07211300527cda5e982eb9a643ecfe6ee6a659d3.jpg) ``` 当前用户和数据库 ``` [<img src="https://images.seebug.org/upload/201504/0721131513b54e4bf1bca0908548832a97853090.jpg" alt="06.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/0721131513b54e4bf1bca0908548832a97853090.jpg) ``` ```