某教学系统存在注入漏洞(部分通过)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: SQL注入文件: ``` /anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx ``` 案例: ``` http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1 http://jmzx.xmedu.cn:9999/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1 http://www.gxbyzx.cn:88/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1 http://oa.w12z.com/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1 http://www.xwgjzx.com:8888/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1 http://szxx.pudong-edu.sh.cn/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx? id=1 ``` ### 漏洞证明: 时间关系我就测试一个: ``` http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1 ``` [<img src="https://images.seebug.org/upload/201503/28231953bd5a166c363de00f79b4b064f8acccef.jpg" alt="01.jpg" width="600"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息