### 简要描述:
RT
### 详细说明:
注入文件:
```
/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx
```
案例:
```
http://218.78.241.80/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
http://jmzx.xmedu.cn:9999/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
http://www.gxbyzx.cn:88/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
http://oa.w12z.com/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
http://www.xwgjzx.com:8888/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
http://szxx.pudong-edu.sh.cn/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
```
### 漏洞证明:
时间关系,我就测试一个:
```
http://218.78.241.80/anmai/KY_Mamage/Others/Communion_Incept_Right.aspx?depname=a
```
[<img src="https://images.seebug.org/upload/201503/2823022593314f9a4aaae3ef436e6306eef08528.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/2823022593314f9a4aaae3ef436e6306eef08528.jpg)
```
当前用户和数据库
```
[<img src="https://images.seebug.org/upload/201503/282302380c9d6f6b4619504d2abcf13ec2c8330f.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/282302380c9d6f6b4619504d2abcf13ec2c8330f.jpg)
```
```
暂无评论