提出 #777507: Shenzhen Ruiming Technology Co., Ltd. Crocus System 1.3.44 SQL Injection情報

タイトルShenzhen Ruiming Technology Co., Ltd. Crocus System 1.3.44 SQL Injection
説明A critical SQL injection vulnerability was discovered in the RemoteFormat.do component of Crocus. The endpoint fails to properly sanitize the State parameter in POST requests. By providing a specially crafted header Cookie: a="", an attacker can bypass the internal authentication check and reach the vulnerable SQL execution logic. Due to the lack of input validation, a remote unauthenticated attacker can perform time-based blind SQL injection to extract sensitive database information (e.g., the database name saffron) or achieve full database compromise.
ソース⚠️ https://my.feishu.cn/docx/QZU6dXZBBoBeLMx4K28cW1BEnsZ?from=from_copylink
ユーザー
 0menc (UID 75423)
送信2026年03月11日 08:58 (22 日 ago)
モデレーション2026年03月26日 17:29 (15 days later)
ステータス承諾済み
VulDBエントリ353661 [Shenzhen Ruiming Technology Streamax Crocus 迄 1.3.44 Endpoint /RemoteFormat.do State SQLインジェクション]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!