某通用教育网站程序SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 某通用教育网站程序SQL注入漏洞 ### 详细说明: 使用量非常多 http://www.dlwsxx.com/ws2004/model/login1.asp http://www.fzjcxx.cn/ws2004/model/login1.asp http://www.nxyancgjzx.com/ws2004/model/login1.asp http://www.sgtjb.com/ws2004/model/login1.asp http://www.sdwhys.com/ws2004/model/login1.asp http://www.zjnksyzx.com:8801/ws2004/model/login1.asp POST /ws2004/Model/login.asp HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: http://www.dlwsxx.com/ws2004/Model/login1.asp Accept-Language: zh-CN User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Host: www.dlwsxx.com Content-Length: 27 Proxy-Connection: Keep-Alive Pragma: no-cache Cookie: ASPSESSIONIDAQCARBST=DLONNCLBEGDINPLGPOPIBDMM; ASPSESSIONIDASCCTBTT=JNBHGPHCJDAKCOPJAHFNFALG; _gscbrs_1506829729=1; _gscu_1506829729=2271980982ws6z97; _gscs_1506829729=t22759970xaxrw197|pv:1 UN=admin&PW=admin&SysUser=0 --- Place: POST Parameter: UN Type:...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息