/web/source/mc/fangroup.ctrl.php
修改文件第60行为:
$sql = 'UPDATE ' . tablename('mc_mapping_fans') . " SET `groupid`= :tagids WHERE `fanid`=:fanid;";
pdo_query($sql, array(":tagids" => $tagids, ":fanid" => $fans['fanid']) );删除for里面的
pdo_query($sql);
if (!empty($count)) {
$buffSize = ceil($count / 500);
for ($i = 0; $i < $buffSize; $i++) {
$sql = '';
$buffer = array_slice($fans_list, $i * 500, 500);
foreach ($buffer as $fans) {
$tagids = trim(str_replace(','.$tagid.',', ',', $fans['groupid']), ',');
if ($tagids == ',') {
$tagids = '';
}
// $sql .= 'UPDATE ' . tablename('mc_mapping_fans') . " SET `groupid`='" . $tagids . "' WHERE `fanid`={$fans['fanid']};";
$sql = 'UPDATE ' . tablename('mc_mapping_fans') . " SET `groupid`= :tagids WHERE `fanid`=:fanid;";
pdo_query($sql, array(":tagids" => $tagids, ":fanid" => $fans['fanid']) );
}
// pdo_query($sql);
}
}/web/source/mc/fangroup.ctrl.php,阿里云微擎二次注入漏洞,微擎漏洞修复,微擎