74cms 逻辑漏洞导致sql注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 74cms 逻辑漏洞导致sql注入 ### 详细说明: include/fun_personal.php(381-398) ``` $j=get_resume_basic($uid,$pid); $searchtab['sex']=$j['sex']; $searchtab['nature']=$j['nature']; $searchtab['marriage']=$j['marriage']; $searchtab['experience']=$j['experience']; $searchtab['district']=$j['district']; $searchtab['sdistrict']=$j['sdistrict']; $searchtab['wage']=$j['wage']; $searchtab['education']=$j['education']; $searchtab['photo']=$j['photo']; $searchtab['refreshtime']=$j['refreshtime']; $searchtab['talent']=$j['talent']; updatetable(table('resume_search_rtime'),$searchtab,"uid='{$uid}' AND id='{$pid}'"); $searchtab['key']=$j['key']; $searchtab['likekey']=$j['intention_jobs'].','.$j['recentjobs'].','.$j['specialty'].','.$j['fullname']; updatetable(table('resume_search_key'),$searchtab,"uid='{$uid}' AND id='{$pid}'"); ``` 当第一次提交的时候,参数做了过滤,然是系统存入数据库时候,又被还原回来了,所以$j=get_resume_basic($uid,$pid);所取出来的数据,是一个干净的没有被转义过的数据,...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息