PHP云人才系统任意刷钱(附演示)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: PHP云人才系统任意刷钱漏洞,演示详细过程,利用难度低0-0! ### 详细说明: 起因在member\model\com.class.php文件中: ``` function dingdan_action(){ if($_POST['price']){ if($_POST['comvip']){ $comvip=(int)$_POST['comvip']; $ratinginfo = $this->obj->DB_select_once("company_rating","`id`='".$comvip."'"); $price = $ratinginfo['service_price']; $data['type']='1'; }elseif($_POST['price_int']){ $price = $_POST['price_int']/$this->config['integral_proportion']; //integral_proportion = 20 只是简单的相除,没有判断正负。 $data['type']='2'; }elseif($_POST['price_msg']){ $price = $_POST['price_msg']/$this->config['integral_msg_proportion']; $data['type']='5'; }else{ $this->obj->ACT_layer_msg("参数不正确,请正确填写!",8,$_SERVER['HTTP_REFERER']); } $dingdan=mktime().rand(10000,99999); //订单生产的订单号,使用时间戳加上随机数。 $data['order_id']=$dingdan; $data['order_price']=$price; $data['order_time']=mktime(); $data['order_state']="1"; $data['order_remark']=trim($_POST['remark']); $data['uid']=$this->uid; $data['rating']=$_POST['comvip'];...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息