phpems某处设计失误导致3枚SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: phpems某处设计失误导致3枚SQL注入漏洞 ### 详细说明: 4. PHPems再来3枚SQL注入漏洞吧 存在漏洞代码位置在/app/exam/app.php的lesson()函数中 public function lesson() { $action = $this->ev->url(3); $page = $this->ev->get('page'); switch($action) { case 'ajax': switch($this->ev->url(4)) { case 'questions': $number = $this->ev->get('number'); if(!$number)$number = 1; $questid = $this->ev->getCookie('questype'); $knowsid = $this->ev->getCookie('knowsid'); $questions = $this->question->getRandQuestionListByKnowid($knowsid,$questid);//存在注入漏洞 $allnumber = $this->exam->getQuestionNumberByQuestypeAndKnowsid($questid,$knowsid);//存在注入漏洞 OK!phpems机制我就不想说了,$knowsid = $this->ev->getCookie('knowsid');的意思就是说knowsid可以人为在cookie中指定 接下来进入函数getRandQuestionListByKnowid($knowsid,$questid)【1】 function getRandQuestionListByKnowid($knowid,$typeid) { $data = array('DISTINCT questions.questionid',array('questions','quest2knows'),array("quest2knows.qkknowsid IN ({$knowid})","quest2knows.qktype = 0","quest2knows.qkquestionid =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息