PHPB2B网站管理系统SQL注入漏洞(无视防注入)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: ``` 注入链接:/virtual-office/job.php 注入参数:job 漏洞代码:(第52行开始) if (!empty($_POST['job']) && $_POST['save']) { $vals = $_POST['job']; pb_submit_check('job'); // 验证post提交的token,可直接使用get访问job.php后在网页源码中搜索formhash获取 $now_job_amount = $job->findCount(null, "created>".$today_start." AND member_id=".$the_memberid); if (isset($_POST['id'])) { $id = $_POST['id']; } if(!empty($_POST['expire_time'])) { $vals['expire_time'] = Times::dateConvert($_POST['expire_time']); } $check_job_update = $g['job_check']; if ($check_job_update=="0") { $vals['status'] = 1; $message_info = 'msg_wait_success'; }else { $vals['status'] = 0; $message_info = 'msg_wait_check'; } $vals['industry_id'] = PbController::getMultiId($_POST['industry']['id']); $vals['area_id'] = PbController::getMultiId($_POST['area']['id']); if(!empty($id)){ $vals['modified'] = $time_stamp; unset($vals['created']); $result = $job->save($vals, "update", $id, null, "member_id=".$the_memberid); $vals =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息