जमा करें #716078: EyouCMS 1.7.6 Command Injectionजानकारी

शीर्षकEyouCMS 1.7.6 Command Injection
विवरणEyouCMS version 1.7.6 contains a SQL Injection vulnerability in the backend template management functionality that leads to Remote Code Execution. The file manager implements incomplete input validation that only blocks {eyou:php} template tags while allowing {eyou:sql} tags. The {eyou:sql} tag handler executes arbitrary SQL queries with minimal restrictions (only blocking DELETE and TRUNCATE). By using MySQL INTO OUTFILE, an authenticated administrator can write malicious PHP files to the webroot, achieving remote code execution.
स्रोत⚠️ https://note-hxlab.wetolink.com/share/XfINjg5i25Ud
उपयोगकर्ता
 yu22x (UID 34832)
सबमिशन16/12/2025 02:20 AM (4 महीनों पहले)
संयम27/12/2025 12:24 PM (11 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि338521 [EyouCMS तक 1.7.6 Backend Template Management FilemanagerLogic.php content SQL इंजेक्शन]
अंक20

Do you want to use VulDB in your project?

Use the official API to access entries easily!