### 简要描述:
DESTOON后台多处SQL注入。
### 详细说明:
后台的sql注入太多了,如下:
```
http://localhost/destoon/admin.php?file=admin&action=edit&userid=1
```
```
http://localhost/destoon/admin.php?moduleid=1&file=admin
```
```
http://localhost/destoon/admin.php?moduleid=1&file=admin&action=add
```
```
http://localhost/destoon/admin.php?file=database
```
```
http://localhost/destoon/admin.php?file=database&action=process
```
```
http://localhost/destoon/admin.php?rand=92&file=database&action=execute
```
[<img src="https://images.seebug.org/upload/201307/26113653ae3f7a13079d9fb1d688c96dc6c9c4e8.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201307/26113653ae3f7a13079d9fb1d688c96dc6c9c4e8.png)
如此处:
```
http://localhost/destoon/admin.php?rand=92&file=database&action=execute
```
```
case 'execute':
if(!isset($CFG['executesql']) || !$CFG['executesql']) msg('系统禁止了执行SQL,请FTP修改根目录config.inc.php<br/>$CFG[\'executesql\'] = \'0\'; 修改为 $CFG[\'executesql\'] = \'1\';');
if($submit) {
if(trim($sql) == '') {
msg('SQL语句为空');
} else {
$sql = stripslashes($sql);
if(preg_match("/DROP(.*)(TABLE|DATABASE)/i", $sql)) msg('系统禁止DROP语句');
sql_execute($sql);
dmsg('执行成功', '?file='.$file.'&action=execute');
}
} else {
include tpl('database_execute');
}
break;
```
变量$sql没有任何过滤,就直接sql_execute($sql)了,如图结果:
[<img src="https://images.seebug.org/upload/201307/26113815a5f4ddef1aca5fb3c49ae7c3789f083a.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201307/26113815a5f4ddef1aca5fb3c49ae7c3789f083a.png)
[<img src="https://images.seebug.org/upload/201307/26113825d64830174e2605b1a2ef906f78442f2a.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201307/26113825d64830174e2605b1a2ef906f78442f2a.png)
后台的注入还有很多,就不一一列举了。
虽然是在后台,但是导出都是注入,低级的错误还是很不好的。
### 漏洞证明:
将详细说明
暂无评论