### 简要描述:
刚看看官网原来跟Srun3000另外一款Srundisk系统
### 详细说明:
Url:http://218.75.75.92/user_space.php?username=admin
[<img src="https://images.seebug.org/upload/201403/02214819c53b2495452db4b51c1d60a77e23ebae.png" alt="2014-03-02_212726.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/02214819c53b2495452db4b51c1d60a77e23ebae.png)
username参数过滤不严,直接单引号检测,直接跳转进入空间页面,但是都到Sqlmap可以直接跑数据。
### 漏洞证明:
```
database management system users [6]:
[*] ''@'localhost'
[*] 'aaa'@'%'
[*] 'guest'@'%'
[*] 'icc'@'%'
[*] 'root'@'127.0.0.1'
[*] 'root'@'localhost'
```
[<img src="https://images.seebug.org/upload/201403/02214840c27fa2c16ccbcbe37e3ddbc1cd735cba.png" alt="2014-03-02_212819.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/02214840c27fa2c16ccbcbe37e3ddbc1cd735cba.png)
暂无评论