### 简要描述: 某通用政务大厅系统SQL注射漏洞 ### 详细说明: google关键词 inurl:permissionitem_list_Sort.jspx?sortcode= 技术支持:深圳太极软件有限公司 存在注入漏洞,影响多个地方的政务大厅 如下,测试后均存在漏洞 存在漏洞的参数是sortcode参数 ``` http://www.kfxzzx.gov.cn/permissionitem_list_Sort.jspx?sortcode=003003&areaid=410203 http://222.143.52.13/permissionitem_list_Sort.jspx?sortcode=001001012&areaid=410100 http://www.gzegn.gov.cn/gzzfwz/permissionitem_list_Sort.jspx?sortcode=002018 http://smwsbsdt.xintai.gov.cn/permissionitem_list_Sort.jspx?sortcode=002001015 http://www.gazwzx.org:8888/permissionitem_list_Sort.jspx?sortcode=002006&areaid=520555 http://fw.hzzk.gov.cn/permissionitem_list_Sort.jspx?sortcode=001002004 http://www.zyszwdt.gov.cn/permissionitem_list_Sort.jspx?sortcode=002003002&areaid=620700 http://www.gzdpc.gov.cn:8080/gzzfwz/permissionitem_list_Sort.jspx?sortcode=002026 http://www.gzfg.gov.cn:8080/permissionitem_list_Sort.jspx?sortcode=002001017&areaid=520327 http://58.42.237.134:8888/permissionitem_list_Sort.jspx?sortcode=001015&areaid=520000...
### 简要描述: 某通用政务大厅系统SQL注射漏洞 ### 详细说明: google关键词 inurl:permissionitem_list_Sort.jspx?sortcode= 技术支持:深圳太极软件有限公司 存在注入漏洞,影响多个地方的政务大厅 如下,测试后均存在漏洞 存在漏洞的参数是sortcode参数 ``` http://www.kfxzzx.gov.cn/permissionitem_list_Sort.jspx?sortcode=003003&areaid=410203 http://222.143.52.13/permissionitem_list_Sort.jspx?sortcode=001001012&areaid=410100 http://www.gzegn.gov.cn/gzzfwz/permissionitem_list_Sort.jspx?sortcode=002018 http://smwsbsdt.xintai.gov.cn/permissionitem_list_Sort.jspx?sortcode=002001015 http://www.gazwzx.org:8888/permissionitem_list_Sort.jspx?sortcode=002006&areaid=520555 http://fw.hzzk.gov.cn/permissionitem_list_Sort.jspx?sortcode=001002004 http://www.zyszwdt.gov.cn/permissionitem_list_Sort.jspx?sortcode=002003002&areaid=620700 http://www.gzdpc.gov.cn:8080/gzzfwz/permissionitem_list_Sort.jspx?sortcode=002026 http://www.gzfg.gov.cn:8080/permissionitem_list_Sort.jspx?sortcode=002001017&areaid=520327 http://58.42.237.134:8888/permissionitem_list_Sort.jspx?sortcode=001015&areaid=520000 http://211.142.146.2:8016/permissionitem_list_Sort.jspx?sortcode=003004&areaid= http://wsbs.xinhui.gov.cn/permissionitem_list_Sort.jspx?sortcode=002001014&areaid=440705 ``` ### 漏洞证明: 测试时均存在漏洞,找到几个测试例子 [<img src="https://images.seebug.org/upload/201410/2116134986b020a85ad9edf79bdc79fb300a50f0.png" alt="开封7.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/2116134986b020a85ad9edf79bdc79fb300a50f0.png) [<img src="https://images.seebug.org/upload/201410/21161401aaa900a39d149a0753b4cc42c826cf8b.png" alt="开封6.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/21161401aaa900a39d149a0753b4cc42c826cf8b.png) [<img src="https://images.seebug.org/upload/201410/2116141243f0cdfb990b0265374ee043e94480a4.png" alt="开封5.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/2116141243f0cdfb990b0265374ee043e94480a4.png) [<img src="https://images.seebug.org/upload/201410/2116142722d036807ec33bec79c0d483094ce020.png" alt="开封4.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/2116142722d036807ec33bec79c0d483094ce020.png) [<img src="https://images.seebug.org/upload/201410/21161438cf6171381ddd2984644eb0b798c3a8c5.png" alt="开封3.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/21161438cf6171381ddd2984644eb0b798c3a8c5.png) [<img src="https://images.seebug.org/upload/201410/211615097635eac5f1ff255f217a87888a6bb1a5.png" alt="开封2.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/211615097635eac5f1ff255f217a87888a6bb1a5.png) 跑出的一下表 [<img src="https://images.seebug.org/upload/201410/211615209a998a43a9cff13fcd5f58feabd39c75.png" alt="开封1.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/211615209a998a43a9cff13fcd5f58feabd39c75.png)