KPPW最新版SQL注入漏洞八(全局问题导致12处注入及越权操作)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: KPPW最新版SQL注入漏洞八,从一处问题找出罪魁祸首,全局文件问题导致12处注入及越权操作 ### 详细说明: KPPW最新版SQL注入漏洞八,从一处问题找出罪魁祸首,全局文件问题导致12处注入及越权操作 文件/control/pubgoods.php ``` <?php kekezu::check_login(); $strPageTitle = '发布商品-'.$_K ['html_title']; $strPageKeyword = '发布商品,'.$_K ['html_title']; $strPageDescription = $kekezu->_sys_config['index_seo_desc']; $id = intval($id); $step = strval(trim($step)); ...... $strUrl = "index.php?do=pubgoods&id=".$id; $_SESSION['spread'] = 'index.php?do=pubgoods'; require S_ROOT . "/shop/" . $arrModelInfo['model_dir'] . "/control/pub.php"; ``` 看最后两行,这里的$arrModelInfo['model_dir']可以为goods或者service 当$arrModelInfo['model_dir']为goods时,我们跟进文件: /shop/goods/control/pub.php ``` <?php defined ( 'IN_KEKE' ) or exit ( 'Access Denied' ); $stdCacheName = 'service_cache_'.$id.'_' . substr ( md5 ( $gUid ), 0, 6 ); $objRelease = goods_release_class::get_instance ($id); $objRelease->get_service_obj ( $stdCacheName ); $arrPubInfo = $objRelease->_std_obj->_release_info; $arrConfig =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息