ecmall 2.x SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

漏洞文件app/buyer_groupbuy.app.php ``` function exit_group() { $id = empty($_GET['id']) ? 0 : $_GET['id']; //没过滤你懂的。 if (!$id) { $this->show_warning('no_such_groupbuy'); return false; } // 判断是否能退团 if (!$this->_ican($id, ACT)) //跟进 { $this->show_warning('Hacking Attempt'); return; } } function _ican($id, $act = '') { $group = current($this->_member_mod->getRelatedData('join_groupbuy', $this->visitor->info['user_id'], array( 'conditions' => 'gb.group_id=' . $id, //带入 'order' => 'gb.group_id DESC', 'fields' => 'gb.state,groupbuy_log.order_id' ))); } ``` eccore/model/mode.base.php ``` function getRelatedData($relation_name, $ids, $find_param = array()) { /* 构造查询条件 */ $conditions = $alias . '.' . $relation_info['foreign_key'] . ' ' . db_create_in($ids); //主键值限定 $conditions .= $relation_info['ext_limit'] ? ' AND ' . $this->_getExtLimit($relation_info['ext_limit'], $alias) : ''; $conditions .= is_string($find_param['conditions']) ? ' AND ' . $find_param['conditions'] : '';...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息