e107 0.7.20 Usersettings页面SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

e107是用php编写的内容管理系统。 e107的usersettings.php页面存在SQL注入漏洞: if ($ret == '') { $loginname = strip_tags($_POST['loginname']); if (!$loginname) { $loginname = $udata['user_loginname']; } else { if(!check_class($pref['displayname_class'], $udata['user_classlist'], $peer)) { $new_username = "user_name = '{$loginname}', "; $username = $loginname; } } ... $_POST['signature'] = $tp->toDB($_POST['signature']); $_POST['realname'] = $tp->toDB($_POST['realname']); ... // We can update the basic user record now $sql->db_Update("user", "{$new_username} {$pwreset} {$sesschange} user_email='".$tp -> toDB($_POST['email'])."', user_signature='".$_POST['signature']."', user_image='".$tp -> toDB($_POST['image'])."', user_timezone='".$tp -> toDB($_POST['timezone'])."', user_hideemail='".intval($tp -> toDB($_POST['hideemail']))."', user_login='".$_POST['realname']."' {$new_customtitle},...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息