ShyPost企业建站系统SQL注射漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

出错文件:CompVisualizeBig.asp ``` set rs=server.createobject("adodb.recordset") sql="select * from CompVisualize order by id desc" rs.open sql,conn,1,1 dim MaPerPage MaPerPage=9 dim text,checkpage text="0123456789" Rs.PageSize=MaPerPage for i=1 to len(request("page")) checkpage=instr(1,text,mid(request("page"),i,1)) if checkpage=0 then exit for end if next If checkpage<>0 then If NOT IsEmpty(request("page")) Then CurrentPage=Cint(request("page")) If CurrentPage < 1 Then CurrentPage = 1 If CurrentPage > Rs.PageCount Then CurrentPage = Rs.PageCount Else CurrentPage= 1 End If If not Rs.eof Then Rs.AbsolutePage = CurrentPage end if Else CurrentPage=1 End if call list ``` '显示帖子的子程序 Sub list()%> select * from CompVisualize order by id desc 查询id的时候没有用引号,导致了sql注入的产生?是这样吗? ``` D:\sqlmap>python sqlmap.py -u http://www.shypost.com/demo/CompVisualizeBig.asp?i d=10 _ ___ ___| |_ ___ ___ {1.0-dev-nongit-20150806} |_ -| . | | | .'| . | |___|_ |_|_|_|_|__,| _| |_| |_| http://sqlmap.org [!] legal...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息