U-Mail邮件系统注入(SQL Injections in MySQL...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: SQL Injections in MySQL LIMIT clause,恰巧该邮件系统这处存在缺陷,刚好来个案例展示,通过注入可以获取管理员密码 ### 详细说明: 漏洞产生的原因,sql语句中的limit由用户可控,其处理不当因而导致了sql注入的产生 漏洞文件/client/oab/module/operates.php 代码为 ``` if ( ACTION == "member-get" ) { $dept_id = gss( $_GET['dept_id'] ); $dept_id = intval( $dept_id );//此处不传入该变量 $keyword = gss( $_GET['keyword'] ); $page = $_GET['page'] ? gss( $_GET['page'] ) : 1; $limit = $_GET['limit'] ? gss( $_GET['limit'] ) : 25;//此处的limit可控,不传入的话其值为25 $orderby = gss( $_GET['orderby'] ); $is_reverse = gss( $_GET['is_reverse'] ); $data_cache = $Department->getDepartmentByDomainID( $domain_id, "dept_id,name,parent_id,`order`", 0 ); $department_list = create_array( $data_cache, "dept_id", "name" ); $Tree = $Department->getTreeObject( ); $Tree->set_data_cache( $data_cache ); $Tree->sort_data( -1, 1 ); $where = "t1.CalendarOnly='0'"; if ( $dept_id && $dept_id != "-1" ) { $dept_ids = $Tree->get_child_id( $dept_id ); $user_ids = $Department->getMailboxIDByDepartmentID( $dept_ids, 0 );...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息