漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2013-05-31: 细节已通知厂商并且等待厂商处理中
2013-06-04: 厂商已经确认,细节仅向厂商公开
2013-06-14: 细节向核心白帽子及相关领域专家公开
2013-06-24: 细节向普通白帽子公开
2013-07-04: 细节向实习白帽子公开
2013-07-15: 细节向公众公开
简要描述:
9.0 utf8版本 看看是不是注入
详细说明:
[db.WindSqlStatement.execute] SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' at line 1SQL:DELETE FROM pw_message_notices WHERE `uid`=? AND `typeid`=? AND `param` IN
漏洞证明:
[db.WindSqlStatement.execute] SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' at line 1SQL:DELETE FROM pw_message_notices WHERE `uid`=? AND `typeid`=? AND `param` IN
修复方案:
版权声明:转载请注明来源 Rookie@乌云
>
漏洞回应
厂商回应:
危害等级:低
漏洞Rank:3
确认时间:2013-06-04 09:50
厂商回复:
感谢你对我们的支持与关注,此问题并非sql注入,但是存在别的风险。我们会尽快处理此问题。
最新状态:
暂无

