Отправить #204461: Background injection exists in lmxcmsИнформация

НазваниеBackground injection exists in lmxcms
ОписаниеVulnerability name: SQL injection vulnerability Bug description: in the application at http://127.0.0.1/lmxcms141/admin.php? An SQL injection vulnerability is present in m=Acquisi&a=caijiDataList&lid=. An attacker could exploit this vulnerability to perform malicious SQL queries, bypass authentication, access sensitive data, or perform malicious operations on a database. Affected version: Full version We can install the latest version of lmxcms, and then according to the above to repeat, log in the background and then input payload can be directly repeated, the use of difficulty is not high, it is recommended to use sqlmap to do so
Источник⚠️ http://www.lmxcms.com/
Пользователь
 yuanshen (UID 53971)
Представление06.09.2023 10:08 (3 лет назад)
Модерация16.09.2023 08:47 (10 days later)
Статуспринято
Запись VulDB239858 [lmxcms до 1.41 admin.php lid SQL-инъекция]
Баллы17

Do you want to use VulDB in your project?

Use the official API to access entries easily!