Z-Blog的php版前台正则SQL盲注漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 第二发...另外有点疑惑想问下你们的开发 ### 详细说明: 问题出在 /zb_system/function/c_system_common.php ``` function GetVars($name,$type='REQUEST'){ if ($type=='ENV') {$array=&$_ENV;} if ($type=='GET') {$array=&$_GET;} if ($type=='POST') {$array=&$_POST;} if ($type=='COOKIE') {$array=&$_COOKIE;} if ($type=='REQUEST') {$array=&$_REQUEST;} if ($type=='SERVER') {$array=&$_SERVER;} if ($type=='SESSION') {$array=&$_SESSION;} if ($type=='FILES') {$array=&$_FILES;} if(isset($array[$name])){ var_dump($array[$name]); return $array[$name]; }else{ return null; } } ``` GET过来的数据木有经过过滤就进入dbsql.php里面查询 在前台的搜索框里输入注入语句,h为可搜索到的字符 h%') and 1)# [<img src="https://images.seebug.org/upload/201309/24114346b4796e74569456ade3719137ec351b74.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201309/24114346b4796e74569456ade3719137ec351b74.jpg) and 1可以替换成SQL注入,这里使用正则盲注 h%')and 1=(SELECT 1 FROM information_schema.tables WHERE TABLE_SCHEMA="zblog" AND table_name REGEXP '^[a-z]'...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息