### 简要描述: rt 但是绕过方法比上一个http://wooyun.org/bugs/wooyun-2013-025053 更简单 - -! ### 详细说明: [<img src="https://images.seebug.org/upload/201306/031422002790ac4f01e8559d5c65be4e4d4c223f.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201306/031422002790ac4f01e8559d5c65be4e4d4c223f.png) ``` 漏洞文件/admin/privilege.php elseif ($_REQUEST['act'] == 'signin'){ if (!empty($_SESSION['captcha_word']) && (intval($_CFG['captcha']) & CAPTCHA_ADMIN)){ include_once(ROOT_PATH . 'includes/cls_captcha.php'); /* 检查验证码是否正确 */ $validator = new captcha(); if (!empty($_POST['captcha']) && !$validator->check_word($_POST['captcha'])) {//此处有严重逻辑错误,也就是说我不post验证码就可以不检查验证码了 sys_msg($_LANG['captcha_error'], 1); } } $_POST['username'] = isset($_POST['username']) ? trim($_POST['username']) : ''; $_POST['password'] = isset($_POST['password']) ? trim($_POST['password']) : ''; ........ ``` ### 漏洞证明: 同http://wooyun.org/bugs/wooyun-2013-025053 只是不需要提交captcha字段
### 简要描述: rt 但是绕过方法比上一个http://wooyun.org/bugs/wooyun-2013-025053 更简单 - -! ### 详细说明: [<img src="https://images.seebug.org/upload/201306/031422002790ac4f01e8559d5c65be4e4d4c223f.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201306/031422002790ac4f01e8559d5c65be4e4d4c223f.png) ``` 漏洞文件/admin/privilege.php elseif ($_REQUEST['act'] == 'signin'){ if (!empty($_SESSION['captcha_word']) && (intval($_CFG['captcha']) & CAPTCHA_ADMIN)){ include_once(ROOT_PATH . 'includes/cls_captcha.php'); /* 检查验证码是否正确 */ $validator = new captcha(); if (!empty($_POST['captcha']) && !$validator->check_word($_POST['captcha'])) {//此处有严重逻辑错误,也就是说我不post验证码就可以不检查验证码了 sys_msg($_LANG['captcha_error'], 1); } } $_POST['username'] = isset($_POST['username']) ? trim($_POST['username']) : ''; $_POST['password'] = isset($_POST['password']) ? trim($_POST['password']) : ''; ........ ``` ### 漏洞证明: 同http://wooyun.org/bugs/wooyun-2013-025053 只是不需要提交captcha字段