### 简要描述:
phpshe 注入漏洞
### 详细说明:
```
module/index/order.php
case 'cartdel':
$money['order_productmoney'] = $money['order_wlmoney'] =
$money['order_money'] = 0;
if (pe_login('user')) {
$result = $db->pe_delete('cart', array
('user_id'=>$_s_user_id, 'product_id'=>$_g_product_id));//product_id参数没
过滤 直接带入语句
}
else {
$cart_list = unserialize($_c_cart_list);
unset($cart_list[$_g_product_id]);
$result = is_array($cart_list[$_g_product_id]) ?
false : true;
setcookie('cart_list', serialize($cart_list), 0,
'/');
}
$cart_info = cart_info($cart_list);
echo json_encode(array('result'=>$result,
'money'=>$cart_info['money']));
break;
```
### 漏洞证明:
测试
注册用户登录后
http://127.0.0.1/phpshe/index.php?mod=order&act=cartdel&product_id=1%27
[<img src="https://images.seebug.org/upload/201405/06184352a7592a101f2af691f47644cffb3dd5b6.png" alt="QQ截图20140506183958.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/06184352a7592a101f2af691f47644cffb3dd5b6.png)
暂无评论