### 简要描述: 教育系统,危害很大啊 ### 详细说明: #1.通用程序的介绍 ``` 1、建站程序类型:JSP+Oracle 2、漏洞类型:SQL注入 3、注入参数:blogId 4、危害程度:高危 8、涉及厂商:上海释锐教育软件有限公司 9、厂商网站:http://threeoa.com/ 10、是否拥有源代码分析:暂无 12、inurl:space?blogId= 13、是否默认配置:是 14、枚举案例【应乌云的要求,枚举5例】: http://www.threeoa.com/ 附官网一枚 http://www.hshsh.pudong-edu.sh.cn/ http://www.yk2z.ykedu.net/ http://www.zjyk2z.net/ http://58.217.106.249/ ``` ### 漏洞证明: #2.通用型漏洞证明 先尝试是否有注入 [<img src="https://images.seebug.org/upload/201409/271105143f7b80da2090e359307268d527d83a34.jpg" alt="QQ截图20140927110453.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/271105143f7b80da2090e359307268d527d83a34.jpg) 实例1: ``` python sqlmap.py -u http://www.threeoa.com/bl40/space?blogId=201611032 ``` [<img src="https://images.seebug.org/upload/201409/27110712fd53856fe5a8c112af4f427f535c1e2e.jpg" alt="QQ截图20140927110635.jpg" width="600"...
### 简要描述: 教育系统,危害很大啊 ### 详细说明: #1.通用程序的介绍 ``` 1、建站程序类型:JSP+Oracle 2、漏洞类型:SQL注入 3、注入参数:blogId 4、危害程度:高危 8、涉及厂商:上海释锐教育软件有限公司 9、厂商网站:http://threeoa.com/ 10、是否拥有源代码分析:暂无 12、inurl:space?blogId= 13、是否默认配置:是 14、枚举案例【应乌云的要求,枚举5例】: http://www.threeoa.com/ 附官网一枚 http://www.hshsh.pudong-edu.sh.cn/ http://www.yk2z.ykedu.net/ http://www.zjyk2z.net/ http://58.217.106.249/ ``` ### 漏洞证明: #2.通用型漏洞证明 先尝试是否有注入 [<img src="https://images.seebug.org/upload/201409/271105143f7b80da2090e359307268d527d83a34.jpg" alt="QQ截图20140927110453.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/271105143f7b80da2090e359307268d527d83a34.jpg) 实例1: ``` python sqlmap.py -u http://www.threeoa.com/bl40/space?blogId=201611032 ``` [<img src="https://images.seebug.org/upload/201409/27110712fd53856fe5a8c112af4f427f535c1e2e.jpg" alt="QQ截图20140927110635.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27110712fd53856fe5a8c112af4f427f535c1e2e.jpg) [<img src="https://images.seebug.org/upload/201409/27131302243165fdd44ebfe064b3896863ff585a.jpg" alt="QQ截图20140927131240.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27131302243165fdd44ebfe064b3896863ff585a.jpg) 实例2: ``` http://www.hshsh.pudong-edu.sh.cn/bl/space?blogId=wxj ``` [<img src="https://images.seebug.org/upload/201409/27131337aee45f84c200748c739dae8f3fae2338.jpg" alt="QQ截图20140927131317.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27131337aee45f84c200748c739dae8f3fae2338.jpg) 实例3: ``` http://www.yk2z.ykedu.net/bl/space?blogId=yk2zt0117&tpId=1 ``` [<img src="https://images.seebug.org/upload/201409/2713302993aab4b8f2a450441ad7c25c10b464fa.jpg" alt="QQ截图20140927132959.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/2713302993aab4b8f2a450441ad7c25c10b464fa.jpg) 实例4: ``` http://www.zjyk2z.net/bl/space?blogId=yk2zt0093 ``` [<img src="https://images.seebug.org/upload/201409/27155842f6ad70dd5e285a89ce77843fe86d9283.png" alt="QQ截图20140927155823.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27155842f6ad70dd5e285a89ce77843fe86d9283.png) 实例5: ``` http://58.217.106.249/bl/space?blogId=t161&tpId=1 ``` [<img src="https://images.seebug.org/upload/201409/271614566187f3619e958cf821657fce79892b2c.png" alt="QQ截图20140927161434.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/271614566187f3619e958cf821657fce79892b2c.png)