Espcms v5.6 暴力注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: Espcms 某处挺有意思的注入,虽然对传值有加密并且随机key,但可以逆向重举这个弱伪随机数来控制sql任意参数,导致系统注入 ### 详细说明: interface\membermain.php 第 33行 ``` $db_sql = "SELECT * FROM $db_table1 LEFT JOIN $db_table2 ON a.userid = b.userid WHERE a.userid = $this->ec_member_username_id "; ``` ec_member_username_id 直接从cookies的ecisp_member_info 系统对cookie进行特定的加密 并且随机出key 加密函数: public\class_function.php 第179 行 ``` function eccode($string, $operation = 'DECODE', $key = '@LFK24s224%@safS3s%1f%') { $result = ''; if ($operation == 'ENCODE') { for ($i = 0; $i < strlen($string); $i++) { $char = substr($string, $i, 1); $keychar = substr($key, ($i % strlen($key)) - 1, 1); $char = chr(ord($char) + ord($keychar)); $result.=$char; } $result = base64_encode($result); $result = str_replace(array('+', '/', '='), array('-', '_', ''), $result); } elseif ($operation == 'DECODE') { $data = str_replace(array('-', '_'), array('+', '/'), $string); $mod4 = strlen($data) % 4; if ($mod4) { $data .= substr('====', $mod4); } $string =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息