### 简要描述:
这是补充的,,,
### 详细说明:
这是补充的,,,
shop7z某版本一枚SQL注入(demo测试)
版本:Shop7z网上购物系统V3.7
http://down.chinaz.com/soft/35103.htm
SQL注入漏洞文件:showone.asp 注入参数:l_id=
demo测试:http://www.shop7z.com/demo/showone.asp?l_id=44
[<img src="https://images.seebug.org/upload/201503/1721584691fd15a57bfe1956c26c3356460ceb47.png" alt="QQ图片20150317214717.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/1721584691fd15a57bfe1956c26c3356460ceb47.png)
[<img src="https://images.seebug.org/upload/201503/17215837ff24d969b243dd39d07ce7290232a6f9.png" alt="QQ图片20150317214817.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/17215837ff24d969b243dd39d07ce7290232a6f9.png)
### 漏洞证明:
可搜索到案例:
http://www.hpego.com/showone.asp?l_id=41
http://www.kcp88.com/showone.asp?l_id=55
http://special.fjnet.com/123/showone.asp?l_id=41
http://www.nx168.cn/showone.asp?l_id=41
http://www.bdlianzhong.com/showone.asp?l_id=41
注入漏洞证明:
[<img src="https://images.seebug.org/upload/201503/172159333cbe8364c2d124ffa5667472d0ad36b1.png" alt="QQ图片20150317215610.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/172159333cbe8364c2d124ffa5667472d0ad36b1.png)
暂无评论