Soumettre #108460: Novel-Plus 3.6.2 exists SQL injectioninformation

TitreNovel-Plus 3.6.2 exists SQL injection
DescriptionThe vulnerability was found in the backend, and during the white-box audit, it was discovered that the backend password was weak by default, and the cause was the inability to pre-compile the orderby field using mybatis, and no filtering was done There is a list method under the author controller in the novel module, which does not have any processing of the parameters to go to the next step in the process
La source⚠️ https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit2.0.pdf
Utilisateur yece (UID 43741)
Soumission31/03/2023 03:10 (il y a 3 ans)
Modérer14/04/2023 08:31 (14 days later)
StatutAccepté
Entrée VulDB225917 [novel-plus 3.6.2 list?limit=10&offset=0&order=desc sort injection SQL]
Points19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!