Exploit Title:PHPMyWind 5.3 has XSS Exploit Author:小雨 Vendor Homepage:http://phpmywind.com Software Link:http://phpmywind.com/downloads/PHPMyWind_5.3.zip Version:5.3 CVE:CVE-2017-12984 $r= $dosql->GetOne("SELECT Max(orderid) AS orderid FROM `#@__message`"); $orderid= (empty($r['orderid']) ? 1 : ($r['orderid'] + 1)); $nickname= htmlspecialchars($nickname);//游客(xxx) $contact= htmlspecialchars($contact); //联系方式 $content= htmlspecialchars($content); //留言内容 $posttime= GetMkTime(time()); $ip= gethostbyname($_SERVER['REMOTE_ADDR']); $sql= "INSERT INTO `#@__message` (siteid, nickname, contact, content, orderid, posttime, htop, rtop, checkinfo, ip) VALUES (1, '$nickname', '$contact', '$content', '$orderid', '$posttime', '', '', 'false', '$ip')"; if($dosql->ExecNoneQuery($sql)) { ShowMsg('留言成功,感谢您的支持!','message.php'); exit(); } } 可以看出使用htmlspecialchars进行过滤,带入库中. 跟进content参数。 127.0.0.1/PHPMyWind_5.3/admin/ message_update.php 修改留言 GetOne("SELECT * FROM `#@__message` WHERE `id`=$id"); ?>
修改留言 刷新
用户名:
联系方式:
留言内容: