网站地图    收藏   

主页 > 后端 > 网站安全 >

大旗网论坛和精品体验子站SQL注入 - 网站安全

来源:自学PHP网    时间:2015-04-17 14:11 作者: 阅读:

[导读] 有两处SQL注入分别是:http://bbs.daqi.com/cgi-bin/bbs/author.cgi?author=test#39;http://try.daqi.com/cgi-bin/experience/exp_active_email?key=testuid=test#39;xmysql::query() error: You have an......

有两处SQL注入
分别是:
http://bbs.daqi.com/cgi-bin/bbs/author.cgi?author=test'
http://try.daqi.com/cgi-bin/experience/exp_active_email?key=test&uid=test'
 
 
xmysql::query() error: You have an error in your SQL syntax. Check the manual that corresponds to your MySQL server version for the right syntax to use near ''test'' limit 1' at line 1 - select jparticle.id_jparticle,jparticle.id_jpdir,jparticle.id_article,jparticle.title,jparticle.url,jparticle.id_bbs,jparticle.bbsname,jparticle.postdate,jparticle.click,jparticle.replycount,jparticle.dirno,jparticle.author,jparticle.level,jparticle.weight,jparticle.weight_score,jparticle.state,jparticle.notelevel,jparticle.id_site,jparticle.sitename,jparticle.msgno from jparticle where author='test'' limit 1 www.2cto.com
 
 
xmysql::query() error: Unknown column 'test' in 'where clause' - select count(*) from exp_user where id=test and active_state=0 and v_key='test'
漏洞证明:

http://bbs.daqi.com/cgi-bin/bbs/author.cgi?author=test'
http://try.daqi.com/cgi-bin/experience/exp_active_email?key=test&uid=test'
修复方案:

过滤参数

作者 zhk

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论