大汉jcms多处SQL注入二(附80个案例)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 一类很明显,但目前不容易发现的漏洞 ### 详细说明: webservice 漏洞,目前非常多的系统均有该service 恰巧的是,该service的漏洞,是不被人注意的,因而 教容易产生漏洞 /jcms/services/WSReceive?wsdl 下图的多个方法,方法中的多个参数均存在注入 [<img src="https://images.seebug.org/upload/201501/04202015188133831fa9066379c3c339618dae7c.jpg" alt="0.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/04202015188133831fa9066379c3c339618dae7c.jpg) 随便选取一个方法进行测试 /jcms/services/WSReceive?wsdl wsGetColumn方法 用WSockExpert v0.7抓包,并保存为wooyun.txt [<img src="https://images.seebug.org/upload/201501/042022090ed626266d864fad5fcf89eadf47347a.jpg" alt="00.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/042022090ed626266d864fad5fcf89eadf47347a.jpg) ``` POST /jcms/services/WSReceive?wsdl HTTP/1.1 Accept-Encoding: gzip,deflate Content-Type: text/xml;charset=UTF-8 SOAPAction: "" Content-Length: 121 Host: www.wugang.gov.cn Connection: Keep-Alive User-Agent: google <soapenv:Envelope...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息