PHP-Fusion submit.php文件SQL注入漏洞 CVE-2008-1918 CNNVD-200804-342 CNVD-2008-2060

6.0 AV AC AU C I A
发布: 2008-04-23
修订: 2017-09-29

PHP-Fusion是一款基于PHP的内容管理系统。 PHP-Fusion的submit.php文件没有正确地过滤对submit_info[]参数的输入便在SQL查询中使用,远程攻击者可能利用此漏洞执行SQL注入攻击。 相关代码: 1. if ($stype == \"l\") { 2. 3. if (isset($_POST[\'\'submit_link\'\'])) { 4. 5. if ($_POST[\'\'link_name\'\'] != \"\" && $_POST[\'\'link_url\'\'] != \"\" && $_POST[\'\'link_description\'\'] != \"\") { 6. $submit_info[\'\'link_category\'\'] = stripinput($_POST[\'\'link_category\'\']); 7. $submit_info[\'\'link_name\'\'] = stripinput($_POST[\'\'link_name\'\']); 8. $submit_info[\'\'link_url\'\'] = stripinput($_POST[\'\'link_url\'\']); 9. $submit_info[\'\'link_description\'\'] = stripinput($_POST[\'\'link_description\'\']); 10. $result = dbquery(\"INSERT INTO \".$db_prefix.\"submissions (submit_type, submit_user, submit_datestamp, submit_criteria) VALUES (\'\'l\'\', \'\'\".$userdata[\'\'user_id\'\'].\"\'\', \'\'\".time().\"\'\', \'\'\".serialize($submit_info).\"\'\')\");...

0%
当前有4条漏洞利用/PoC
当前有2条受影响产品信息