Ecmall的几处SQL注射漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: 搜了下,发现/app/seller_groupbuy.app.php里面还有6处注入: 分别是该文件下drop(),start(),finished(),desc(),cancel(),log()函数中的id参数 以finished()为例: ``` function finished() { $id = empty($_GET['id']) ? 0 : $_GET['id'];//id参数未过滤 if (!$id) { $this->show_warning('no_such_groupbuy'); return false; } if (!$this->_ican($id, ACT)) //进入_ican函数,跟进 { $this->show_warning('Hacking Attempt'); return; } /* 团购信息 */ $group = $this->_groupbuy_mod->get(array( 'conditions' => 'group_id=' . $id, 'fields' => 'group_name', )); if (!$this->_groupbuy_mod->edit($id, array('state' => GROUP_FINISHED, 'end_time' => gmtime()))) { $this->show_warning($this->_groupbuy_mod->get_error()); return; } $content = get_msg('tobuyer_groupbuy_finished_notify', array('group_name' => $group['group_name'], 'id' => $id)); $this->_groupbuy_mod->sys_notice( $id, array('buyer'), '', $content, array('msg') ); $this->show_message('finished_ok'); } ``` _ican函数代码: ``` function _ican($id, $act = '') { $state_permission = array(...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息