PHP-Fusion submit.php文件SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

BUGTRAQ ID: 28855 PHP-Fusion是一款基于PHP的内容管理系统。 PHP-Fusion的submit.php文件没有正确地过滤对submit_info[]参数的输入便在SQL查询中使用,远程攻击者可能利用此漏洞执行SQL注入攻击。 相关代码: 1. if ($stype == "l") { 2. 3. if (isset($_POST['submit_link'])) { 4. 5. if ($_POST['link_name'] != "" && $_POST['link_url'] != "" && $_POST['link_description'] != "") { 6. $submit_info['link_category'] = stripinput($_POST['link_category']); 7. $submit_info['link_name'] = stripinput($_POST['link_name']); 8. $submit_info['link_url'] = stripinput($_POST['link_url']); 9. $submit_info['link_description'] = stripinput($_POST['link_description']); 10. $result = dbquery("INSERT INTO ".$db_prefix."submissions (submit_type, submit_user, submit_datestamp, submit_criteria) VALUES ('l', '".$userdata['user_id']."', '".time()."', '".serialize($submit_info)."')");...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息