Iwebmall 最新版SQL注入第十枚

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: Iwebmall 最新版SQL注入第十枚 ### 详细说明: 看到wooyun上有人提了几个iweb的漏洞( [WooYun: iwebmall商城程序sql注入](http://www.wooyun.org/bugs/wooyun-2014-078282) ),我来捡捡漏儿吧,希望不要重复。 先把注入点拿出来:www.xxx.com/do.php?act=user_protect_rights ,POST的内容中有个参数protect_item,对protect_item使用shotr_check()进行了过滤,但是这里是数字型的,直接绕过过滤。 /action/user/protect_rights.action.php ``` 无关代码 // 处理post变量 $order_id = intval(get_args('id')); $protect_content = big_check(get_args('protect_content')); $protect_item = short_check(get_args('protect_item')); $ask_service = big_check(get_args('ask_service')); //数据库操作 dbtarget('r',$dbServs); $dbo = new dbex(); //判断商品是否锁定,锁定则不许操作 $sql = "select b.goods_id from $t_order_info as a join $t_order_goods as b on a.order_id=b.order_id where a.order_id=$order_id"; $row = $dbo->getRow($sql); if($row){ $goods_id=$row['goods_id']; } include("foundation/fgoods_locked.php"); //判断用户是否锁定,锁定则不许操作 $sql = "select locked from $t_users where user_id=$user_id"; $row = $dbo->getRow($sql); if($row['locked']==1){...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息