U-Mail邮件系统一处接口漏洞(可sql注入,任意用户登陆,获取管理员密码)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 用户量这么多的邮件系统,分分钟钟就被getshell是件很令人头疼的事情。 ### 详细说明: 1.邮件系统介绍 1)官方下载地址:http://www.comingchina.com/html/downloads/ 2)版本:最新版V9.8.57 3)测试环境:Windows Server 2003+IIS6.0+官方默认软件 4)使用案例:http://www.comingchina.com/html/case/ OR Google "Powered by U-Mail" 漏洞代码 附600多url下载 链接: http://pan.baidu.com/s/1nQRzo 密码: ld5k /fast/oab/module/operates.php ``` if ( ACTION == "save-to-pab" ) { include_once( LIB_PATH."PAB.php" ); $PAB = PAB::getinstance( ); $maillist_id = trim( $_GET['maillist'] ); if ( $maillist_id ) { $member_all = $Maillist->getMemberByMaillistID( $maillist_id, "Mailbox,FullName", 0 ); if ( !$member_all ) { dump_json( array( "status" => TRUE, "message" => "" ) ); } foreach ( $member_all as $member ) { if ( !$PAB->getContactByMail( $user_id, $member['Mailbox'], "contact_id", 0 ) ) { $data = array( "user_id" => $user_id, "fullname" => $member['FullName'], "pref_email" => $member['Mailbox'], "updated" => date( "Y-m-d H:i:s" ) ); $res = $PAB->add_contact( $data, 0 ); if ( !$res ) {...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息