| タイトル | Shanghai Lingdang Information Technology Lingdang CRM ≤V8.6.4.3 SQL Injection |
|---|
| 説明 | There is an SQL injection vulnerability in the system interface tabdetail_moduleSave.php. In the JSON request received by the interface, the getvaluestring field is not effectively parameterized and is directly concatenated into the SQL query statement. Attackers can launch time blind injection attacks by constructing statements such as SELECT IF (1=1, SLEEP (10), 0) to detect database structure and obtain sensitive information. The vulnerability is due to the lack of pre compiled statements and input validation. It is recommended to fix it as soon as possible. |
|---|
| ソース | ⚠️ https://www.notion.so/SQL2-2459bb66b0a5802ba8e9ca5bc775fc7d?source=copy_link |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2025年08月04日 08:42 (9 月 ago) |
|---|
| モデレーション | 2025年08月19日 07:44 (15 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 320520 [Shanghai Lingdang Information Technology Lingdang CRM 迄 8.6.4.7 tabdetail_moduleSave.php getvaluestring SQLインジェクション] |
|---|
| ポイント | 17 |
|---|