当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-043616

漏洞标题:建站宝最新版sql注入漏洞

相关厂商:建站宝

漏洞作者: Matt

提交时间:2013-11-21 18:49

修复时间:2014-02-19 18:49

公开时间:2014-02-19 18:49

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-11-21: 积极联系厂商并且等待厂商认领中,细节不对外公开
2014-02-19: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

建站宝注入漏洞

详细说明:

module/mod_product.php
public function prdlist() {
$this->_layout = 'frontpage';
$curr_product_category = new ProductCategory();
$cap_id = trim(ParamHolder::get('cap_id','0'));//没有过滤
$user_role = trim(SessionHolder::get('user/s_role','{guest}'));
$curr_locale = trim(SessionHolder::get('_LOCALE'));
$page_title = new MenuItem();
$title_info = $page_title->find(" `link`=? and s_locale=?",array("_m=mod_product&_a=prdlist",$curr_locale)," limit 1");
$search_where = '';
$search_params = array();
$prd_keyword=trim($_REQUEST["prd_keyword"]);
if (strlen($prd_keyword) >0) {
$search_where .= ' AND (name LIKE ? OR description LIKE ?)';
$search_params = array_merge($search_params,
array('%'.$prd_keyword.'%','%'.$prd_keyword.'%'));
$this->assign('prd_keyword',$prd_keyword);
}
else if (intval($cap_id) >1) {
$product_category = new ProductCategory();
$product_categories = $product_category->findAll();
if(empty($product_categories)) $product_categories = array();
foreach($product_categories as $k =>$v)
{
$this->stack[$v->id] = $v->product_category_id;
}
$this->findout[] = $cap_id;
$this->getCategoryList();
$search_where = " AND product_category_id IN (''";
foreach($this->findout as $k =>$v)
{
$search_where .= ",$v";
}
$search_where .= ') AND product_category_id <> 0';
$curr_product_category = new ProductCategory($cap_id);//这里注入了
}
try {
官方测试
http://test.3655188.com/index.php?_m=mod_product&_a=prdlist&cap_id=90

漏洞证明:

QQ截图20131112225010.jpg


QQ截图20131112225314.jpg

修复方案:

过滤

版权声明:转载请注明来源 Matt@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝