|
Description: unintentionally black box found dircms there is a wide byte to bring the injection problem, although popular over a period of time, looks like now people are not too concerned about this issue. Tested under found there are two places there is a problem:
- http://demo. dircms. net/lifecms/search/index. php? type=content&catid=1 2 7&xs=&wylx=%BF’%20order%20by%2 0 1 0 0% 2 3
This is not to say
- http://demo. dircms. net/lifecms/guestbook/index. php? action=post
This place is similar to the Empire guestbook that wide byte injection, the title and content can use a wide bytes into SQL statement execution
Author:tojen