| タイトル | Novel-Plus 3.6.2 exists SQL injection |
|---|
| 説明 | The vulnerability was found in the backend, and during the white-box audit, it was discovered that the backend password was weak by default, and the cause was the inability to pre-compile the orderby field using mybatis, and no filtering was done
There is a list method under the author controller in the novel module, which does not have any processing of the parameters to go to the next step in the process |
|---|
| ソース | ⚠️ https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit2.0.pdf |
|---|
| ユーザー | yece (UID 43741) |
|---|
| 送信 | 2023年03月31日 03:10 (3 年 ago) |
|---|
| モデレーション | 2023年04月14日 08:31 (14 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 225917 [novel-plus 3.6.2 list?limit=10&offset=0&order=desc sort SQLインジェクション] |
|---|
| ポイント | 19 |
|---|