CmsEasy最新版5.5_UTF-8_20140802绕过四次补丁继续SQL注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: CmsEasy最新版5.5_UTF-8_20140802绕过四次补丁继续SQL注入 ### 详细说明: CmsEasy最新版5.5_UTF-8_20140802,前面被雨神饶了三次 [WooYun: cmseasy绕过补丁SQL注入一枚](http://www.wooyun.org/bugs/wooyun-2014-053198) [WooYun: 继续绕过cmseasy补丁继续注入](http://www.wooyun.org/bugs/wooyun-2014-053737) [WooYun: 持续绕过cmseasy两次补丁继续注入](http://www.wooyun.org/bugs/wooyun-2014-054220) 最新的里面也修复了,但是修复不完整,这是第四次补丁了 继续绕过,进行SQL注入 来看看文件:archive_act.php ``` function respond_action() { include_once ROOT . '/lib/plugins/pay/' . front::$get['code'] . '.php'; $payclassname = front::$get['code']; $payobj = new $payclassname(); $uri = $_SERVER["REQUEST_URI"]; $__uriget = strstr($uri, '?'); $__uriget = str_replace('?', '', $__uriget); $__uriget = explode('&', $__uriget); $_GET = array(); foreach ($__uriget as $key => $val) { $tmp = explode('=', $val); $_GET[$tmp[0]] = $tmp[1]; if(preg_match('/\'|select|union|"/i', $tmp1)){ exit('非法参数'); } } file_put_contents('logs11.txt', var_export($_GET,true)); $status = $payobj->respond(); if ($status) { echo '<script...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息