tipaskSQL注入漏洞(无视GPC)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 某处过滤不全 再次过滤还是未考虑全 ### 详细说明: ``` function onsearch() { $qstatus = $status = $this->get[3] ? $this->get[3] : 1; (1 == $status) && ($qstatus = "1,2,6,9"); (2 == $status) && ($qstatus = "2,6"); $word = urldecode($this->post['word'] ? str_replace("%27", "", $this->post['word']) : $this->get[2]); (!trim($word)) && $this->message("搜索关键词不能为空!", 'BACK'); $navtitle = $word . '-搜索问题'; @$page = max(1, intval($this->get[4])); $pagesize = $this->setting['list_default']; $startindex = ($page - 1) * $pagesize; if (preg_match("/^tag:(.+)/", $word, $tagarr)) { $tag = $tagarr[1]; $rownum = $_ENV['question']->rownum_by_tag($tag, $qstatus); $questionlist = $_ENV['question']->list_by_tag($tag, $qstatus, $startindex, $pagesize); } else { $questionlist = $_ENV['question']->search_title($word, $qstatus, 0, $startindex, $pagesize); $rownum = $_ENV['question']->search_title_num($word, $qstatus); } $related_words = $_ENV['question']->get_related_words(); $hot_words =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息