| Titre | Novel-Plus 3.6.2 exists SQL injection |
|---|
| Description | The vulnerability was found in the backend, and during the white-box audit, it was discovered that the backend password was weak by default, and the cause was the inability to pre-compile the orderby field using mybatis, and no filtering was done
There is a list method under the author controller in the novel module, which does not have any processing of the parameters to go to the next step in the process |
|---|
| La source | ⚠️ https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit2.0.pdf |
|---|
| Utilisateur | yece (UID 43741) |
|---|
| Soumission | 31/03/2023 03:10 (il y a 3 ans) |
|---|
| Modérer | 14/04/2023 08:31 (14 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 225917 [novel-plus 3.6.2 list?limit=10&offset=0&order=desc sort injection SQL] |
|---|
| Points | 19 |
|---|