### 简要描述: rt ### 详细说明: 有人提交了,就顺手来看看~ 漏洞文件:core/public/singleplandetail.jsp 漏洞参数:pk=1012F41000000000WA2V 漏洞类型:SQL注入漏洞(GET型) 影响用户: 收集几个案例,方便测试 ``` http://nc.xhlbdc.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://nc.pinggugroup.com:81/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://123.232.105.202/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://nc55.hspark.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://erp.minyoun.com/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://zfkg.com:8081/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://61.175.97.50/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V ``` 实例演示: 1. http://zfkg.com:8081/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V [<img src="https://images.seebug.org/upload/201412/311205443c8cf4530002028e5281a349b4a666d0.jpg" alt="1.jpg" width="600"...
### 简要描述: rt ### 详细说明: 有人提交了,就顺手来看看~ 漏洞文件:core/public/singleplandetail.jsp 漏洞参数:pk=1012F41000000000WA2V 漏洞类型:SQL注入漏洞(GET型) 影响用户: 收集几个案例,方便测试 ``` http://nc.xhlbdc.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://nc.pinggugroup.com:81/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://123.232.105.202/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://nc55.hspark.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://erp.minyoun.com/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://zfkg.com:8081/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V http://61.175.97.50/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V ``` 实例演示: 1. http://zfkg.com:8081/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V [<img src="https://images.seebug.org/upload/201412/311205443c8cf4530002028e5281a349b4a666d0.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/311205443c8cf4530002028e5281a349b4a666d0.jpg) 2. http://erp.minyoun.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V [<img src="https://images.seebug.org/upload/201412/31120629180616a87e1e68bdbd65dda81cb9a748.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31120629180616a87e1e68bdbd65dda81cb9a748.jpg) 3. http://nc.xhlbdc.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V [<img src="https://images.seebug.org/upload/201412/311207063a53ee20f1d22e5e9292c0a41bdc1265.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/311207063a53ee20f1d22e5e9292c0a41bdc1265.jpg) 4. http://nc.pinggugroup.com:81/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V [<img src="https://images.seebug.org/upload/201412/31120742a689646a8e63eb6171b7bdfe65b5308e.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31120742a689646a8e63eb6171b7bdfe65b5308e.jpg) 5. http://61.175.97.50/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V [<img src="https://images.seebug.org/upload/201412/31120824c33fc079fd191932dd3dcaf636fb4d90.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31120824c33fc079fd191932dd3dcaf636fb4d90.jpg) ### 漏洞证明: 见详细