### 简要描述:
### 详细说明:
某学位论文提交系统通用SQL漏洞。
案例:
http://**.**.**.**:8001//paper/forget1.jsp
**.**.**.**:8001//paper/forget1.jsp
http://**.**.**.**:8080//paper/forget1.jsp
**.**.**.**:8001//paper/forget1.jsp
http://**.**.**.**:8001/paper/forget1.jsp
### 漏洞证明:
证明:
http://**.**.**.**:8001//paper/forget1.jsp
[<img src="https://images.seebug.org/upload/201507/0411200311649e1dd12aa55047fad9f98a3bfbee.png" alt="QQ图片20150704111658.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/0411200311649e1dd12aa55047fad9f98a3bfbee.png)
```
POST数据
POST //paper/forget2.jsp HTTP/1.1
Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, */*
Referer: http://**.**.**.**:8001//paper/forget1.jsp
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Content-Type: application/x-www-form-urlencoded
DontTrackMeHere: gzip, deflate
Host: **.**.**.**:8001
Content-Length: 50
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: JSESSIONID=2DBD4EFAEA6E2FB56357B6E39B79674D
code=1&r_code=%D1%A7%BA%C5%B2%BB%C4%DC%CE%AA%BF%D5
```
[<img src="https://images.seebug.org/upload/201507/04112024500f7626115437bb1bc30f2b6a6feafc.png" alt="QQ图片20150704111714.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/04112024500f7626115437bb1bc30f2b6a6feafc.png)
[<img src="https://images.seebug.org/upload/201507/0411203275cc85b4dadd89236ee20885ebf95ad3.jpg" alt="QQ图片20150704111737.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/0411203275cc85b4dadd89236ee20885ebf95ad3.jpg)
暂无评论