继续注入,给个20分呗.

网站存在注入,详情见漏洞证明。

发送如下Get请求:(注入参数username)
 

GET /statnew/checktopichouse?username=zbw110&name=11&refrate=&sear_date=2016-04-25&excel=0&currpage=1 HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: ?username=zbw110&name=&refrate=&sear_date=2016-04-25&excel=0&currpage=1 Accept-Language: zh-CN User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Accept-Encoding: gzip, deflate Host: broker2.esf.leju.com Proxy-Connection: Keep-Alive Cookie: PHPSESSID=j0bcnd83dtltcosbti2rpnika2; Hm_lvt_f9347a0b98ca170b3b4ceb05b7a4e153=1461637325; Hm_lpvt_f9347a0b98ca170b3b4ceb05b7a4e153=1461637394; uc_uc_uid=7729128; uc_username=lj_shop543; uc_last_uptime=2015-09-09+16%3A13%3A22; uc_citycode=bj; uc_uc_type=1; uc_rdm=347468830; UC_PASSPORT=7729128%5E%3A%5Elj_shop543%5E%3A%5E2015-09-09%2B16%253A13%253A22%5E%3A%5Ebj%5E%3A%5E1%5E%3A%5E%5E%3A%5E347468830%5E%3A%5E%5E%3A%5E5dfc343f951607cec2fa0e3675febd48%5E%3A%5E




 



12库
 





数据库用户名密码: