| Título | Shenzhen Ruiming Technology Co., Ltd. Crocus System 1.3.44 SQL Injection |
|---|
| Descripción | A critical SQL injection vulnerability was discovered in the RemoteFormat.do component of Crocus. The endpoint fails to properly sanitize the State parameter in POST requests. By providing a specially crafted header Cookie: a="", an attacker can bypass the internal authentication check and reach the vulnerable SQL execution logic. Due to the lack of input validation, a remote unauthenticated attacker can perform time-based blind SQL injection to extract sensitive database information (e.g., the database name saffron) or achieve full database compromise. |
|---|
| Fuente | ⚠️ https://my.feishu.cn/docx/QZU6dXZBBoBeLMx4K28cW1BEnsZ?from=from_copylink |
|---|
| Usuario | 0menc (UID 75423) |
|---|
| Sumisión | 2026-03-11 08:58 (hace 21 días) |
|---|
| Moderación | 2026-03-26 17:29 (15 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 353661 [Shenzhen Ruiming Technology Streamax Crocus hasta 1.3.44 Endpoint /RemoteFormat.do State inyección SQL] |
|---|
| Puntos | 20 |
|---|