We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hello,
I would like to report for SQLI vulnerability.
File shopex\ecshop\upload\api\client\api.php
dispatch($_POST);
File shopex\ecshop\upload\api\client\includes\lib_api.php
function dispatch($post) { $func_arr = array('GetDomain', 'UserLogin', 'AddCategory', 'AddBrand', 'AddGoods', 'GetCategory', 'GetBrand', 'GetGoods', 'DeleteBrand', 'DeleteCategory', 'DeleteGoods', 'EditBrand', 'EditCategory', 'EditGoods'); if(in_array($post['Action'], $func_arr) && function_exists('API_'.$post['Action'])) { call_user_func('API_'.$post['Action'], $post);
function API_UserLogin($post) { $post['username'] = isset($post['UserId']) ? trim($post['UserId']) : ''; $post['password'] = isset($post['Password']) ? strtolower(trim($post['Password'])) : ''; $sql = "SELECT user_id, user_name, password, action_list, last_login". " FROM " . $GLOBALS['ecs']->table('admin_user') . " WHERE user_name = '" . $post['username']. "'"; $row = $GLOBALS['db']->getRow($sql);
File shopex\ecshop\upload\includes\cls_mysql.php
function getRow($sql, $limited = false) { $res = $this->query($sql);
The text was updated successfully, but these errors were encountered:
Hello, I would like to report for SQLI vulnerability. Vulnerability path File shopex\ecshop\upload\api\client\api.php dispatch($_POST); File shopex\ecshop\upload\api\client\includes\lib_api.php function dispatch($post) { $func_arr = array('GetDomain', 'UserLogin', 'AddCategory', 'AddBrand', 'AddGoods', 'GetCategory', 'GetBrand', 'GetGoods', 'DeleteBrand', 'DeleteCategory', 'DeleteGoods', 'EditBrand', 'EditCategory', 'EditGoods'); if(in_array($post['Action'], $func_arr) && function_exists('API_'.$post['Action'])) { call_user_func('API_'.$post['Action'], $post); File shopex\ecshop\upload\api\client\includes\lib_api.php function API_UserLogin($post) { $post['username'] = isset($post['UserId']) ? trim($post['UserId']) : ''; $post['password'] = isset($post['Password']) ? strtolower(trim($post['Password'])) : ''; $sql = "SELECT user_id, user_name, password, action_list, last_login". " FROM " . $GLOBALS['ecs']->table('admin_user') . " WHERE user_name = '" . $post['username']. "'"; $row = $GLOBALS['db']->getRow($sql); File shopex\ecshop\upload\includes\cls_mysql.php function getRow($sql, $limited = false) { $res = $this->query($sql);
Hello,The program exits when it runs to this point, and it will not cause sql injection
api/client/includes/init.php:101
if ((!isset($_SESSION['admin_id']) || intval($_SESSION['admin_id']) <= 0) && ($_POST['Action'] != 'UserLogin')) { client_show_message(110); }
Sorry, something went wrong.
No branches or pull requests
Hello,
I would like to report for SQLI vulnerability.
Vulnerability path
File shopex\ecshop\upload\api\client\api.php
File shopex\ecshop\upload\api\client\includes\lib_api.php
File shopex\ecshop\upload\api\client\includes\lib_api.php
File shopex\ecshop\upload\includes\cls_mysql.php
The text was updated successfully, but these errors were encountered: