### 简要描述:
最近用友高产,不知道重复没;
### 详细说明:
漏洞文件:
/background/recievesms.php
/background/timeoutlogin.php
```
$sql = "UPDATE tc_background_task SET plan_start_time=".tdb_todatebystring( $timestr )." WHERE org_id=0 AND bg_task_id=".$ID;
$gblDB->execute( $sql );
$sql = "SELECT bg_server_ip FROM tc_background_task WHERE org_id=0 AND bg_task_id=".$ID;
$rs = $gblDB->query( $sql );
```
两个文件中的ID参数都未进行过滤,直接进行SQL查询了。
### 漏洞证明:
```
http://58.220.225.28:8080/background/recievesms.php?ID=1
http://58.220.225.28:8080/background/timeoutlogin.php?ID=1
```
[<img src="https://images.seebug.org/upload/201408/11014329e656d3968be6c088cd4267ab2dbf22a0.png" alt="xx.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/11014329e656d3968be6c088cd4267ab2dbf22a0.png)
[<img src="https://images.seebug.org/upload/201408/110154468ebdf7555ae5d082808518f6e0ac31a3.png" alt="databases.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/110154468ebdf7555ae5d082808518f6e0ac31a3.png)
google 关键字:用友TurboCRM inurl:login.php
(sqlmap如果不能--dbs的话,试试直接--tables)
暂无评论