TCCMS SQL注入漏洞(同一文件多处)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: ### 详细说明: /app/controller/picture.class.php ``` public function all() { $_Obj = M($this->objName); $categoryObj = M("category"); $_Obj->pageSize = 20; $where = "1=1"; $key = $_POST['key'];//注入 $cid = $_GET['cid']; if ($key != "") { $where .= " and id = '" . $key . "' or title like '%$key%'";//注入 下面多处都是注入 } if (!empty($cid) && $cid != "") { $where .= " and classid = " . $cid; } if ($_GET["type"] == "user") { $where .= " and uid = " . $_COOKIE['userId']; ``` ### 漏洞证明: 测试方法 打开 127.0.0.1/tccms//index.php?ac=picture_all POST提交 key=1111111121' [<img src="https://images.seebug.org/upload/201311/22190203c3ded3fae76ee615f29829787eceb803.jpg" alt="QQ截图20131122185726.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22190203c3ded3fae76ee615f29829787eceb803.jpg)

0%
暂无可用Exp或PoC
当前有0条受影响产品信息