### 简要描述: 刚看看官网原来跟Srun3000另外一款Srundisk系统 ### 详细说明: Url:http://218.75.75.92/user_space.php?username=admin [<img src="https://images.seebug.org/upload/201403/02214819c53b2495452db4b51c1d60a77e23ebae.png" alt="2014-03-02_212726.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/02214819c53b2495452db4b51c1d60a77e23ebae.png) username参数过滤不严,直接单引号检测,直接跳转进入空间页面,但是都到Sqlmap可以直接跑数据。 ### 漏洞证明: ``` database management system users [6]: [*] ''@'localhost' [*] 'aaa'@'%' [*] 'guest'@'%' [*] 'icc'@'%' [*] 'root'@'127.0.0.1' [*] 'root'@'localhost' ``` [<img src="https://images.seebug.org/upload/201403/02214840c27fa2c16ccbcbe37e3ddbc1cd735cba.png" alt="2014-03-02_212819.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/02214840c27fa2c16ccbcbe37e3ddbc1cd735cba.png)
### 简要描述: 刚看看官网原来跟Srun3000另外一款Srundisk系统 ### 详细说明: Url:http://218.75.75.92/user_space.php?username=admin [<img src="https://images.seebug.org/upload/201403/02214819c53b2495452db4b51c1d60a77e23ebae.png" alt="2014-03-02_212726.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/02214819c53b2495452db4b51c1d60a77e23ebae.png) username参数过滤不严,直接单引号检测,直接跳转进入空间页面,但是都到Sqlmap可以直接跑数据。 ### 漏洞证明: ``` database management system users [6]: [*] ''@'localhost' [*] 'aaa'@'%' [*] 'guest'@'%' [*] 'icc'@'%' [*] 'root'@'127.0.0.1' [*] 'root'@'localhost' ``` [<img src="https://images.seebug.org/upload/201403/02214840c27fa2c16ccbcbe37e3ddbc1cd735cba.png" alt="2014-03-02_212819.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/02214840c27fa2c16ccbcbe37e3ddbc1cd735cba.png)