大汉jcms某处SQL注入漏洞一枚

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: 貌似通杀不少版本的~~ 直接分析了 漏洞文件:/jcms/jcms_files/jcms1/web2/site/module/comment/opr_getcount.jsp 漏洞参数:fn_Keywords 漏洞类型:SQL注入(GET型) 漏洞分析: 先看opr_getcount.jsp文件: ``` ......//省掉前面无关代码 <% response.setHeader("Pragma","No-cache"); response.setHeader("Cache-Control","no-cache"); response.setDateHeader("Expires", 0); int colId = Convert.getParameterInt(request, "i_colid", 0); int infoId = Convert.getParameterInt(request, "i_infoid", 0); String pltype = Convert.getParameter(request, "pltype", "",true,true);//这个类型很重要,决定带入那个方法体 String strToPath = application.getRealPath("") + "/jcms_files/jcms" + strAppID+"/web"+strWebID+"/site/module/comment/"; String strIniPath = strToPath +"config/init.xml"; String strIpStyle = xmlFile.getContent("ipstyle", strIniPath); int start = Convert.getParameterInt(request,"startrecord",1); int iPerPage = Convert.getParameterInt(request,"perpage",10); int groupsize = Convert.getParameterInt(request,"groupsize",8); String c_uuid =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息