逐浪CMS某处编码SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 逐浪cms某处编码SQL注入漏洞 ### 详细说明: 地址 ``` http://demo.zoomla.cn/3d/InsertContext.aspx ``` ``` protected void Page_Load(object sender, EventArgs e) { if (base.Request.QueryString["type"] != null) { this.md.Caddtime = DateTime.Now; this.md.Cadduser = this.user.GetLogin().UserName; string s = base.Request.Form.ToString(); s = base.Server.UrlDecode(s); try { s = BaseClass.FromBase64String(s); //base64转换 } catch (Exception exception) { s = exception.ToString() + s; } if (s.IndexOf("$") > -1) { string[] strArray = s.Split(new char[] { '$' }, StringSplitOptions.RemoveEmptyEntries); //分割 if (base.Request.QueryString["type"].ToString() == "Suser") { DataTable table = this.bduser.Select_Where(" Dutype=1 and DuShow=" + strArray[1], " * ", ""); //数组第二部分没处理 存在注入 if (table.Rows.Count > 0) { this.md.Ctouid = DataConverter.CLng(table.Rows[0]["DUid"].ToString()); } this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", ""); if ((this.dt.Rows.Count > 0) && (this.mduser.Dislogin ==...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息