CMSeasy SQL注入漏洞一发(bypass自身与360waf)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 也不知道重复没有- -! ### 详细说明: /lib/default/archive_act.php: ``` function respond_action() { include_once ROOT . '/lib/plugins/pay/' . front::$get['code'] . '.php'; $payclassname = front::$get['code']; $payobj = new $payclassname(); $uri = $_SERVER["REQUEST_URI"]; $__uriget = strstr($uri, '?'); $__uriget = str_replace('?', '', $__uriget); $__uriget = explode('&', $__uriget); $_GET = array(); foreach ($__uriget as $key => $val) { $tmp = explode('=', $val); $_GET[$tmp[0]] = $tmp[1]; if(preg_match('/\'|select|union|"/i', $tmp1)){ exit('非法参数'); } } file_put_contents('logs11.txt', var_export($_GET,true)); $status = $payobj->respond(); ``` 由于程序员的失误导致$tmp1的过滤并没有起到作用,同时由于前面会对code进行过滤 继续跟到alipay.php: ``` function respond() { if (!empty($_POST)) { foreach($_POST as $key =>$data) { if(preg_match('/(=|<|>|\')/', $data)){ return false; } $_GET[$key] = $data; } } $payment = pay::get_payment($_GET['code']); ``` 看看get_payment(). ``` public static function get_payment($code) { $where=array();...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息