谷歌关键词:inurl:/pmember.asp
漏洞地址:/person/mailbox.asp?del= 参数del存在注入 (该处需要登陆,前台注册即可)
案例地址:
http://www.dlcxdrc.com/person/mailbox.asp?del=
http://www.cxdrc.com/person/mailbox.asp?del=
http://www.lncyrc.com.cn/person/mailbox.asp?del=
http://www.lnbprsrc.com/person/mailbox.asp?del=
http://www.fxrsw.cn/rencai/person/mailbox.asp?del=
http://www.jobch263.com/person/mailbox.asp?del=
http://site.czxh.gov.cn/job/person/mailbox.asp?del=
http://www.lsqjy.cn/lsqjy/person/mailbox.asp?del=
http://www.mlqgwyj.com/person/mailbox.asp?del=
http://www.127mc.com/person/mailbox.asp?del=
http://job0514.com/person/mailbox.asp?del=
http://jianzhuzhuangshirc.97197.com/person/mailbox.asp?del=
http://www.shtongda.com/person/mailbox.asp?del=
http://www.yczjw.cn/person/mailbox.asp?del=
http://mojurencai.48448.com/person/mailbox.asp?del=
http://www.0857zp.com/person/mailbox.asp?del=
http://wangluorencaiwang.99292.com/person/mailbox.asp?del=
http://112.124.28.12/person/mailbox.asp?del=
http://www.120hr.cn/person/mailbox.asp?del=
Test:http://www.cxdrc.com/person/mailbox.asp?del=