| Título | Novel-Plus 3.6.2 exists SQL injection |
|---|
| Descrição | The vulnerability was found in the backend, and during the white-box audit, it was discovered that the backend password was weak by default, and the cause was the inability to pre-compile the orderby field using mybatis, and no filtering was done
There is a list method under the author controller in the novel module, which does not have any processing of the parameters to go to the next step in the process |
|---|
| Fonte | ⚠️ https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit2.0.pdf |
|---|
| Utilizador | yece (UID 43741) |
|---|
| Submissão | 31/03/2023 03h10 (há 3 anos) |
|---|
| Moderação | 14/04/2023 08h31 (14 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 225917 [novel-plus 3.6.2 list?limit=10&offset=0&order=desc sort Injeção SQL] |
|---|
| Pontos | 19 |
|---|