释锐教育校校用平台通用SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 释锐教育校校用平台通用SQL注入漏洞 ### 详细说明: 问题出现在info_list.jsp文件 [<img src="https://images.seebug.org/upload/201501/1411212640d43b2d8a122d1bea5320a9ba2d1c35.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1411212640d43b2d8a122d1bea5320a9ba2d1c35.png) ``` String categoryId = Util.dealNull(request.getParameter("categoryId")); if(categoryId.indexOf("08")==0){//特殊网站,特殊处理 response.sendRedirect(request.getContextPath()+"/news_zt/news_list.jsp?categoryId="+categoryId); } String keywords = Util.doParameter(request.getParameter("keywords")); if(categoryId.equals("")&&keywords.equals(""))categoryId = "01"; String readRecordSql = ""; String objectURL = ""; if(!keywords.equals("")){ readRecordSql = "select a.*,b.account,b.name from info a,person b where a.source=0 and a.hold_field6='1' and a.publish_user=b.uuid"; readRecordSql = "select * from ("+readRecordSql+") stb where category_id not in('17','18')"; readRecordSql += " and (info_title...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息