某政务系统一处POST注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: 案例如下: http://wssp.jiangxi.gov.cn:8008/outportal/licenseManage/newLicenseManage.jsp http://117.40.187.175:8008/outportal/licenseManage/newLicenseManage.jsp http://wssp.jdz.gov.cn/outportal/licenseManage/newLicenseManage.jsp http://xzfw.jinxi.gov.cn/outportal/licenseManage/newLicenseManage.jsp http://wssp.lepingshi.gov.cn/outportal/licenseManage/newLicenseManage.jsp http://xzfw.jxcr.gov.cn/outportal/licenseManage/newLicenseManage.jsp http://120.203.196.20/outportal/licenseManage/newLicenseManage.jsp 需要一个一个的抓包。。 1.测试案例:http://wssp.jiangxi.gov.cn:8008/outportal/licenseManage/newLicenseManage.jsp [<img src="https://images.seebug.org/upload/201503/021548340041f90ff657f13f50092586ff51d97b.png" alt="7.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/021548340041f90ff657f13f50092586ff51d97b.png) [<img src="https://images.seebug.org/upload/201503/02154846be96c4187365f16d3aa5fb964debad86.png" alt="8.png" width="600"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息