PJBlog博客程序多个文件存在SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

经代码审核发现blogcomm.asp、class/cls_wap.asp、member.asp存在SQL注入漏洞。 在member.asp文件 1. UID=trim(CheckStr(request.form("UID"))) //191行 2. …………………… 3. set checkUser=conn.execute("select top 1 * from blog_Member where mem_id="&UID" and mem_Name='"&CheckStr(memName)"'") 4. if checkUser.eof then 5. ReInfo(0)="错误信息" 6. ReInfo(1)="<b>不存在此用户<br/>操作失败!</b><br/><a href=""javascript:history.go(-1);"">单击返回</a>" 7. ReInfo(2)="ErrorIcon" 8. SaveMem=ReInfo 9. exit function 10. end if 11. …………………… 12. (214行) 下面给出CheckStr函数原形: Function CheckStr(byVal ChkStr) Dim Str:Str=ChkStr If IsNull(Str) Then CheckStr = "" Exit Function End If Str = Replace(Str, "&", "&") Str = Replace(Str,"'","'") Str = Replace(Str,"""",""") Dim re Set re=new RegExp re.IgnoreCase =True re.Global=True...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息