DESTOON后台多处SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: DESTOON后台多处SQL注入。 ### 详细说明: 后台的sql注入太多了,如下: ``` http://localhost/destoon/admin.php?file=admin&action=edit&userid=1 ``` ``` http://localhost/destoon/admin.php?moduleid=1&file=admin ``` ``` http://localhost/destoon/admin.php?moduleid=1&file=admin&action=add ``` ``` http://localhost/destoon/admin.php?file=database ``` ``` http://localhost/destoon/admin.php?file=database&action=process ``` ``` http://localhost/destoon/admin.php?rand=92&file=database&action=execute ``` [<img src="https://images.seebug.org/upload/201307/26113653ae3f7a13079d9fb1d688c96dc6c9c4e8.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201307/26113653ae3f7a13079d9fb1d688c96dc6c9c4e8.png) 如此处: ``` http://localhost/destoon/admin.php?rand=92&file=database&action=execute ``` ``` case 'execute': if(!isset($CFG['executesql']) || !$CFG['executesql']) msg('系统禁止了执行SQL,请FTP修改根目录config.inc.php<br/>$CFG[\'executesql\'] = \'0\'; 修改为 $CFG[\'executesql\'] = \'1\';');...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息