提出 #204461: Background injection exists in lmxcms情報

タイトルBackground injection exists in lmxcms
説明Vulnerability name: SQL injection vulnerability Bug description: in the application at http://127.0.0.1/lmxcms141/admin.php? An SQL injection vulnerability is present in m=Acquisi&a=caijiDataList&lid=. An attacker could exploit this vulnerability to perform malicious SQL queries, bypass authentication, access sensitive data, or perform malicious operations on a database. Affected version: Full version We can install the latest version of lmxcms, and then according to the above to repeat, log in the background and then input payload can be directly repeated, the use of difficulty is not high, it is recommended to use sqlmap to do so
ソース⚠️ http://www.lmxcms.com/
ユーザー
 yuanshen (UID 53971)
送信2023年09月06日 10:08 (3 年 ago)
モデレーション2023年09月16日 08:47 (10 days later)
ステータス承諾済み
VulDBエントリ239858 [lmxcms 迄 1.41 admin.php lid SQLインジェクション]
ポイント17

Want to know what is going to be exploited?

We predict KEV entries!