dedecms 5.7 edit. inc. php file injection-vulnerability warning-the black bar safety net

2012-11-27T00:00:00
ID MYHACK58:62201235753
Type myhack58
Reporter 佚名
Modified 2012-11-27T00:00:00

Description

Vulnerability file edit. inc. php specific code:<? php

if(! defined('DEDEINC')) exit('Request Error!');

if(! empty($_COOKIE['GUEST_BOOK_POS'])) $GUEST_BOOK_POS = $_COOKIE['GUEST_BOOK_POS'];

else $GUEST_BOOK_POS = "guestbook.php";

$id = intval($id);

if(empty($job)) $job='view';

if($job=='del' && $g_isadmin)

{

$dsql->ExecuteNoneQuery(" DELETE FROM #@__guestbook WHERE id='$id' ");

ShowMsg("successfully deleted a message!", $GUEST_BOOK_POS);

exit();

}

else if($job=='check' && $g_isadmin)

{

$dsql->ExecuteNoneQuery(" UPDATE #@__guestbook SET ischeck=1 WHERE id='$id' ");

ShowMsg("successfully audit a message!", $GUEST_BOOK_POS);

exit();

}

else if($job=='editok')

{

$remsg = trim($remsg);

if($remsg!=")

{

//Administrator reply does not filter HTML

[1] [2] [3] next