tipask注入漏洞2

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 没有啥条件限制,如果说要gpc 、 全局变量条件限制的都不是好漏洞。 ### 详细说明: 众测来打洞,然后白盒代码就读起来了。。。(0day) http://ce.wooyun.org/content/7045 ``` function onaddcomment() { if (isset($this->post['content'])) { $content = htmlspecialchars($this->post['content']); $answerid = intval($this->post['answerid']); $replyauthorid = intval($this->post['replyauthor']); $answer = $_ENV['answer']->get($answerid); $_ENV['answer_comment']->add($answerid, $content, $this->user['uid'], $this->user['username']); ``` 增加评论 其中看 $_ENV['answer_comment']->add($answerid, $content, $this->user['uid'], $this->user['username']); $this->user['username'] 为我们可控,注册test12345a\此类畸形用户名,见上篇分析 跟踪add方法 ``` function add($answerid, $conmment,$authorid,$author) { //echo 'INSERT INTO `' . DB_TABLEPRE . "answer_comment`(`aid`,`authorid`,`author`,`content`,`time`) values ($answerid,$authorid,'$author','$conmment'," . $this->base->time . ")";exit(); $this->db->query('INSERT INTO `' . DB_TABLEPRE ....

0%
暂无可用Exp或PoC
当前有0条受影响产品信息