### 简要描述:
RT
### 详细说明:
SQL注入文件:
```
/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx
```
案例:
```
http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1
http://jmzx.xmedu.cn:9999/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1
http://www.gxbyzx.cn:88/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1
http://oa.w12z.com/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1
http://www.xwgjzx.com:8888/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1
http://szxx.pudong-edu.sh.cn/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?
id=1
```
### 漏洞证明:
时间关系我就测试一个:
```
http://218.78.241.80/anmai/KY_Mamage/Integrate_Select/GetAward_Production_particular.aspx?id=1
```
[<img src="https://images.seebug.org/upload/201503/28231953bd5a166c363de00f79b4b064f8acccef.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/28231953bd5a166c363de00f79b4b064f8acccef.jpg)
```
当前用户和数据库
```
[<img src="https://images.seebug.org/upload/201503/28232006db98ccabb8c1abe03aa3e22a56e3db78.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/28232006db98ccabb8c1abe03aa3e22a56e3db78.jpg)
```
```
暂无评论