PHPMyWind 注入漏洞&任意用户登录

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: PHPMyWind 注入漏洞&任意用户登录 ### 详细说明: ``` member.php if(!empty($_COOKIE['username']) &&//从COOKIE里面解密username然后赋值 !empty($_COOKIE['lastlogintime']) && !empty($_COOKIE['lastloginip'])) { $c_uname = AuthCode($_COOKIE['username']); $c_logintime = AuthCode($_COOKIE['lastlogintime']); $c_loginip = AuthCode($_COOKIE['lastloginip']); } else { $c_uname = ''; $c_logintime = ''; $c_loginip = ''; } //验证是否登录和用户合法 if($a=='saveedit' or $a=='getarea' or $a=='savefavorite' or $a=='delfavorite' or $a=='delcomment' or $a=='delmsg' or $a=='delorder' or $a=='avatar' or $a=='getgoods' or $a=='applyreturn' or $a=='perfect' or $a=='binding' or $a=='removeoqq' or $a=='removeoweibo') { if(!empty($c_uname)) { //guest为一键登陆未绑定账号时的临时用户 if($c_uname != 'guest') { $r = $dosql->GetOne("SELECT `id`,`expval` FROM `#@__member` WHERE `username`='$c_uname'");//通过上面的可以看出来源 shoppingcart.php if($a == 'addshopingcart') { //构成选中属性 if(isset($typeid)) { //参数过滤 $typeid = intval($typeid); //获取商品属性 $dosql->Execute("SELECT *...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息