科讯 6.x - 7.06 SQL 注射漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: ### 详细说明: Author:my5t3ry 转载请注明:t00ls.net 漏洞位于注册页面的\User\Reg\RegAjax.asp 中的24 - 46行 和 254 -270 行 代码如下: ``` Class Ajax_Check Private KS Private Sub Class_Initialize() Set KS=New PublicCls End Sub Private Sub Class_Terminate() Set KS=Nothing End Sub Public Sub Kesion() Select Case KS.S("Action") Case "checkusername" Call CheckUserName() Case "checkemail" Call CheckEmail() Case "checkcode" Call CheckCode() Case "getregform" Call GetRegForm() Case "getcityoption" Call getCityOption() End Select End Sub ……略去无关代码 Sub getCityOption() Dim Province,XML,Node Province=UnEscape(KS.S("Province")) //注意这里 Dim RS:Set RS=Server.CreateObject("ADODB.RECORDSET") RS.Open "Select top 200 a.ID,a.City From KS_Province a Inner Join KS_Province b On A.ParentID=B.ID Where B.City='" & Province & "' order by a.orderid,a.id",conn,1,1 If Not RS.Eof Then Set XML=KS.RsToXml(Rs,"row","") End If RS.Close : Set RS=Nothing If IsObject(XML) Then For Each Node In XML.DocumentElement.SelectNodes("row") KS.Echo...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息