Shopxp v8.0 SQL Injection 0day

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

系统使用了早期的枫叶防注系统,只过滤了GET,并且可以绕过,这里不谈绕过的问题了,我们看到 xplistpl.asp 9-36行代码: <table width="100%" border="0" cellspacing="0" cellpadding="0"> <tr> <td width="88%"><TABLE cellSpacing=0 cellPadding=0 width=100% align=center border=0> <TBODY> <TR> <td width="1" background="img_shopxp/xiao/bgbg.gif"></td> <TD class=b vAlign=top align=left><%if IsNumeric(request.QueryString("id"))=False then response.write("<script>alert(""非法访问!"");location.href=""index.asp"";</script>") response.end end if dim id id=request.QueryString("id") if not isinteger(id) then response.write"<script>alert(""非法访问!"");location.href=""index.asp"";</script>" end if%> <table width="100%" align="center" border="0"...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息