ThinkSAAS SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: ThinkSAAS SQL注入漏洞 ### 详细说明: 问题在上传附件处,/app/photo/action/do.php: ``` //上传 $arrUpload = tsUpload($_FILES['Filedata'],$photoid,'photo',array('jpg','gif','png')); if($arrUpload){ $new['photo']->update('photo',array( 'photoid'=>$photoid, ),array( 'photoname'=>tsClean($arrUpload['name']),//没有过滤,导致SQL注入 'phototype'=>tsClean($arrUpload['type']), 'path'=>tsClean($arrUpload['path']), 'photourl'=>tsClean($arrUpload['url']), 'photosize'=>tsClean($arrUpload['size']), )); } ``` 然后我们我们看到photoname等都没有过滤。 跟进tsUpload函数,/thinksaas/tsFunction.php: ``` function tsUpload($files, $projectid, $dir, $uptypes) { if ($files ['size'] > 0) { $menu2 = intval ( $projectid / 1000 ); $menu1 = intval ( $menu2 / 1000 ); $path = $menu1 . '/' . $menu2; $dest_dir = 'uploadfile/' . $dir . '/' . $path; createFolders ( $dest_dir ); $arrType = explode ( '.', strtolower ( $files ['name'] ) ); // 转小写一下 $type = array_pop ( $arrType ); if (in_array ( $type, $uptypes )) { $name = $projectid . '.' . $type; $dest =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息