某政府系统一处SQL注入#2

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: 山东农友软件公司官网:http://www.nongyou.com.cn/ 案例如下: http://222.135.76.147:8200/ckq/jwhkzjdlist.aspx?tname=宁津办事处&CountryName=所前王家 http://60.217.72.17:7117/ckq/jwhkzjdlist.aspx?tname=山头办&CountryName=河北西社区 http://218.58.124.131:8003/ckq/jwhkzjdlist.aspx?tname=综合保税物流片区&CountryName=北岭村 http://218.56.40.229:8013/ckq/jwhkzjdlist.aspx?tname=昆嵛镇&CountryName=滩上 http://218.56.99.84:8003/ckq/jwhkzjdlist.aspx?tname=昆仑镇&CountryName=河石坞村 http://222.134.154.214:8001/ckq/jwhkzjdlist.aspx?tname=大张庄镇&CountryName=胜利村 1.测试注入点:http://222.134.154.214:8001/ckq/jwhkzjdlist.aspx?tname=大张庄镇&CountryName=胜利村 [<img src="https://images.seebug.org/upload/201412/31171842ae2ea62b05c8f3c56c586622662f8b9e.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31171842ae2ea62b05c8f3c56c586622662f8b9e.png) ``` sqlmap identified the following injection points with a total of 0 HTTP(s) reque sts: --- Place: GET Parameter: tname Type: boolean-based blind...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息