dedecms安全漏洞

dedecms安全漏洞之    /plus/guestbook/edit.inc.php        (大概在55行左右)

1 $dsql->ExecuteNoneQuery("UPDATE `#@__guestbook` SET `msg`='$msg', `posttime`='".time()."' WHERE id='$id' ");

改为:

1 $msg  = addslashes($msg);
2 $dsql->ExecuteNoneQuery("UPDATE `#@__guestbook` SET `msg`='$msg', `posttime`='".time()."' WHERE id='$id' ");

dede上传漏洞    /include/uploadsafe.inc.php    (大概在42行左右)

${$_key.'_size'} = @filesize($$_key);

改为:

${$_key.'_size'} = @filesize($$_key);} $imtypes = array("image/pjpeg", "image/jpeg", "image/gif", "image/png", "image/xpng", "image/wbmp", "image/bmp"); if(in_array(strtolower(trim(${$_key.'_type'})), $imtypes)) { $image_dd = @getimagesize($$_key); if($image_dd == false){ continue; } if (!is_array($image_dd)) { exit('Upload filetype not allow !'); }

53行

$image_dd = @getimagesize($$_key);

改为:

$image_dd = @getimagesize($$_key); if($image_dd == false){ continue; }

猜你喜欢

转载自www.cnblogs.com/lazb/p/12544693.html