### 简要描述:
rt
### 详细说明:
有人提交了,就顺手来看看~
漏洞文件:core/public/singleplandetail.jsp
漏洞参数:pk=1012F41000000000WA2V
漏洞类型:SQL注入漏洞(GET型)
影响用户:
收集几个案例,方便测试
```
http://nc.xhlbdc.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
http://nc.pinggugroup.com:81/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
http://123.232.105.202/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
http://nc55.hspark.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
http://erp.minyoun.com/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
http://zfkg.com:8081/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
http://61.175.97.50/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
```
实例演示:
1.
http://zfkg.com:8081/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
[<img src="https://images.seebug.org/upload/201412/311205443c8cf4530002028e5281a349b4a666d0.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/311205443c8cf4530002028e5281a349b4a666d0.jpg)
2.
http://erp.minyoun.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
[<img src="https://images.seebug.org/upload/201412/31120629180616a87e1e68bdbd65dda81cb9a748.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31120629180616a87e1e68bdbd65dda81cb9a748.jpg)
3.
http://nc.xhlbdc.com/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
[<img src="https://images.seebug.org/upload/201412/311207063a53ee20f1d22e5e9292c0a41bdc1265.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/311207063a53ee20f1d22e5e9292c0a41bdc1265.jpg)
4.
http://nc.pinggugroup.com:81/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
[<img src="https://images.seebug.org/upload/201412/31120742a689646a8e63eb6171b7bdfe65b5308e.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31120742a689646a8e63eb6171b7bdfe65b5308e.jpg)
5.
http://61.175.97.50/epp/core/public/singleplandetail.jsp?pk=1012F41000000000WA2V
[<img src="https://images.seebug.org/upload/201412/31120824c33fc079fd191932dd3dcaf636fb4d90.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201412/31120824c33fc079fd191932dd3dcaf636fb4d90.jpg)
### 漏洞证明:
见详细
暂无评论