### 简要描述:
RT
### 详细说明:
```
Google:inurl:/opac/index.jsp
```
在以及单位这里抓包
[<img src="https://images.seebug.org/upload/201508/12200850a8540078fcf50f67b2b4e4c0e7ee2159.png" alt="QQ截图20150812200806.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/12200850a8540078fcf50f67b2b4e4c0e7ee2159.png)
```
GET /lt/dzgl/dzxxgl/getejdw.jsp?yjdw=00000030 HTTP/1.1
Accept: */*
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/8.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Accept-Encoding: gzip, deflate
Host: **.**.**.**:8070
Proxy-Connection: Keep-Alive
Cookie: JSESSIONID=abc9m9iak5dpP_fybRH8u
```
然后放进sqlmap跑即可
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201508/1220314805b33ca8efa851449e62a750b4814c26.png" alt="QQ截图20150812201904.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/1220314805b33ca8efa851449e62a750b4814c26.png)
[<img src="https://images.seebug.org/upload/201508/122033108a55376e176e4dab169a3676e27f7c52.png" alt="QQ截图20150812201917.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/122033108a55376e176e4dab169a3676e27f7c52.png)
[<img src="https://images.seebug.org/upload/201508/122033223a8f7fd1718c6e16f7ac5250586fe3bd.png" alt="QQ截图20150812202458.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/122033223a8f7fd1718c6e16f7ac5250586fe3bd.png)
[<img src="https://images.seebug.org/upload/201508/12203353484322fd968af369466f0d2941b42e8e.png" alt="QQ截图20150812202516.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/12203353484322fd968af369466f0d2941b42e8e.png)
[<img src="https://images.seebug.org/upload/201508/12203404766b78ffa8bdb4b639292d3537f1c17d.png" alt="QQ截图20150812202931.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/12203404766b78ffa8bdb4b639292d3537f1c17d.png)
```
**.**.**.**:8070/dzzxtj/dztjtj.jsp
**.**.**.**:8070/dzzxtj/dztjtj.jsp
http://**.**.**.**:8070/dzzxtj/dztjtj.jsp
**.**.**.**:8070/dzzxtj/dztjtj.jsp
http://**.**.**.**:8070/dzzxtj/dztjtj.jsp
......
```
暂无评论