U-Mail邮件系统二次注入2(无需登录,可批量直接获取管理员密码)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 声明:不是故意刷漏洞,只是每天打完LOL后分析下,找到一个提交一个,见谅。我卡牌玩的还是很6的。:) ### 详细说明: 漏洞文件/fast/oab/module/operates.php代码 与上一个二次注入缺陷原理都一样,这次是另一个文件,是无需登录的 ``` if ( ACTION == "save-to-pab" ) { include_once( LIB_PATH."PAB.php" ); $PAB = PAB::getinstance( ); $maillist_id = trim( $_GET['maillist'] ); if ( $maillist_id ) { ...... } else { $user_ids = trim( $_GET['userlist'] ); if ( !$user_ids ) { dump_msg( "param_error", "参数错误!" ); } $where = "t1.UserID IN (".$user_ids.")";//这里是之前提交的一个注入 $arr_tmp = $Mailbox->getMailboxInfo( $domain_id, $where, "", "", "", "", 0 );//此处是从数据库里读出用户数据 $user_all = $arr_tmp['data']; if ( !$user_all ) { dump_json( array( "status" => TRUE, "message" => "" ) ); } foreach ( $user_all as $user ) { $qq = $msn = ""; if ( strpos( $user['qqmsn'], "@" ) ) { $msn = $user['qqmsn']; } else { $qq = $user['qqmsn']; } if ( !$PAB->getContactByMail( $user_id, $user['email'], "contact_id", 0 ) ) { $data = array( "user_id" => $user_id, "fullname" => $user['FullName'],//将读出的数据未经处理 "pref_email" =>...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息