제출 #396297: GitHub dingfanzu 1 SQL Injection정보

제목GitHub dingfanzu 1 SQL Injection
설명The reason for the SQL injection vulnerability is that the website application does not verify the validity of the data submitted by the user to the server (type, length, business parameter validity, etc.), and does not effectively filter the data input by the user with special characters , so that the user's input is directly brought into the database for execution, which exceeds the expected result of the original design of the SQL statement, resulting in a SQL injection dingfanzu-CMS does not filter the content correctly at the "chpwd.php" username module, resulting in the generation of SQL injection.
원천⚠️ https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20chpwd.php%20username%20SQL-inject.md
사용자
 fjjwebray.com.cn (UID 73871)
제출2024. 08. 22. AM 09:55 (2 연령 ago)
모더레이션2024. 08. 29. AM 09:26 (7 days later)
상태수락
VulDB 항목276074 [dingfanzu CMS 까지 29d67d9044f6f93378e6eb6ff92272217ff7225c /ajax/chpwd.php 사용자 이름 SQL 주입]
포인트들20

Might our Artificial Intelligence support you?

Check our Alexa App!