| عنوان | Novel-Plus3.6.2 AuthorController list action exists SQL Injection |
|---|
| الوصف | The vulnerability was found in the backend, and during the white-box audit, it was discovered that the backend password was weak by default, and the cause was the inability to pre-compile the orderby field using mybatis, and no filtering was done.
There is a list method under the author controller in the novel module, which does not have any processing of the parameters to go to the next step in the process. |
|---|
| المصدر | ⚠️ https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit.pdf |
|---|
| المستخدم | yece (UID 43741) |
|---|
| ارسال | 26/03/2023 04:43 AM (3 سنوات منذ) |
|---|
| الاعتدال | 14/04/2023 08:32 AM (19 days later) |
|---|
| الحالة | مكرر |
|---|
| إدخال VulDB | 225918 [novel-plus 3.6.2 list?limit=10&offset=0&order=desc sort حقن SQL] |
|---|
| النقاط | 0 |
|---|