### 简要描述:
sa权限,原谅我拿不下webshell
### 详细说明:
注射点1:http://www.emaotai.cn//ProductUnSales.aspx?keywords=wooyun&tagIds=1_2
注射点2::http://www.emaotai.cn/wapshop/productList.aspx?keyWord=
[<img src="https://images.seebug.org/upload/201510/1714083159d09bb0bc3fe8f857d97fb7b4db6631.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1714083159d09bb0bc3fe8f857d97fb7b4db6631.jpg)
[<img src="https://images.seebug.org/upload/201510/1714084336d976123d061f139fd5c39a03d9ee95.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1714084336d976123d061f139fd5c39a03d9ee95.png)
主库,500多个表,应该是订单什么的,但是没去看
[<img src="https://images.seebug.org/upload/201510/17141123f9a51fd3df512ed9c67cdbc33fd5e754.png" alt="5.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/17141123f9a51fd3df512ed9c67cdbc33fd5e754.png)
[<img src="https://images.seebug.org/upload/201510/17141132acf6524471e47a009894c8691d7fc4e9.png" alt="6.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/17141132acf6524471e47a009894c8691d7fc4e9.png)
### 漏洞证明:
看详细说明
暂无评论