Umail最新版2处SQL注入漏洞可遍历数据库(续三)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 大牛们都去挖cmseasy了,我却还在挖umail。 ### 详细说明: Sqli 1:\client\mail\module\o_mail.php Line:559 ``` if ( ACTION == "mail-send" ) { ... if ( !$attach_list ) { $attach_list = array( ); } if ( $_FILES ) { ... } $netdisk_files_id = gss( $_POST['nd_select_file'] ); $nd_send_files_id = gss( $_POST['nd_send_file'] ); if ( $nd_send_files_id && $netdisk_files_id ) { $netdisk_files_id = implode( ",", array( $netdisk_files_id, $nd_send_files_id ) ); $netdisk_files_id = $nd_send_files_id; } if ( $netdisk_files_id ) { include_once( LIB_PATH."Netdisk.php" ); $Netdisk = Netdisk::getinstance( ); $netdiskFileArr = $Netdisk->getFileByIDS( $user_id, $netdisk_files_id); //跟踪 ... ``` 看上面的变量netdisk_files_id代入了getFileByIDS方法,跟踪下该方法: ``` public function getFileByIDS( $userid, $netdisk_files_id, $fields = "*", $debug = FALSE ) { $_obfuscate_IRFhnYw = "user_id='".$userid."' AND file_id IN (".$netdisk_files_id.")";//这里的netdisk_files_id未过滤代入了SQL语句,看看注入吧。 $_obfuscate_6RYLWQ = $this->get_file( array( "fields"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息