Enviar #266016: Taokeyun Taokeyun ≤1.0.5 SQL Injectioninformación

TítuloTaokeyun Taokeyun ≤1.0.5 SQL Injection
DescripciónThe application "Taokeyun" version ≤1.0.5, developed by Taokeyun.cn, has a SQL Injection vulnerability in the file "application/index/controller/app/store/Goods.php". The function "shopGoods" does not properly sanitize the 'keyword' input parameter, allowing arbitrary SQL commands to be executed. This flaw can be exploited by an attacker to manipulate SQL queries, potentially leading to data leakage, data corruption, or even full system compromise. The vulnerability can be confirmed by sending a maliciously crafted request containing the SQL command 'sleep(5)', which causes a delay in the response if the SQL Injection point is present.
Fuente⚠️ https://note.zhaoj.in/share/TKWDqowIoLqs
Usuario
 glzjin (UID 59815)
Sumisión2024-01-11 08:52 (hace 2 años)
Moderación2024-01-12 12:11 (1 day later)
EstadoAceptado
Entrada de VulDB250586 [Taokeyun hasta 1.0.5 HTTP POST Request Goods.php shopGoods keyword inyección SQL]
Puntos20

Interested in the pricing of exploits?

See the underground prices here!