题目:phpwind multiple sql injection vulnerability
威胁程度:控制应用程序系统
错误类型:输入验证错误
利用方式:服务器模式
受影响系统
phpwind 7
phpwind 8
详细描述
phpwind 7和8版本存在输入验证漏洞,攻击者成功利用该漏洞可以远程执行任意php代码。
问题存在于pw_ajax.php中,由于用户提交给fieldname参数的数据缺少充分的过滤,攻击者可利用漏洞进行SQL注入攻击获取任何数据库里的数据。
另外class_other.php中存在一个任意ming令执行的漏洞,由于对$class[cid]输入缺少充分过滤,不过进入此逻辑需要一些较为关键的key,借助上面的注射漏洞即可获得该key。
PHPWind has a sql injection vulnerability, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "fieldname" Parameter in pw_ajax.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
In addition Input passed to the "$class[cid]" Parameter in class_other.php is not properly sanitised before being used in a SQL query. But in order to reach this logic code need some important key, attacker could exploit above sql injection vulnerability to get key .
测试代码
<?php
echo "
解决方案
目前没有详细解决方案提供:http://),转载请保留此信息!