Espcms V5.6.13.04.22 UTF8 正式版注入漏洞之3/N

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 某文件对于从数据库中读取的变量未过滤,放入其他的sql语句中,造成二次sql注入 ### 详细说明: 文件\interface\public.php中: ``` $ec_member_username_id = $this->member_cookieview('userid'); if ($ec_member_username_id) { $rsMember = $this->get_member_attvalue($ec_member_username_id); } $userid = $ec_member_username_id ? $ec_member_username_id : 0; $name = $rsMember['alias'] ? $rsMember['alias'] : ''; $sex = $rsMember['sex'] ? $rsMember['sex'] : 0; $tel = $rsMember['tel'] ? $rsMember['tel'] : ''; $address = $rsMember['address'] ? $rsMember['address'] : ''; $db_field = 'mlvid,userid,name,sex,email,tel,address,isclass,addtime'; $db_values = "$mlvid,$userid,'$name',$sex,'$email','$tel','$address',1,$addtime"; $this->db->query('INSERT INTO ' . $db_table . ' (' . $db_field . ') VALUES (' . $db_values . ')'); ``` 关键代码:$address = $rsMember['address'] ? $rsMember['address'] : ''; $address是从数据库中获取到当前用户个人信息的详细地址,字段address在数据库中为varchar类型,最长字符数255 [<img...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息