| Название | Taokeyun Taokeyun ≤1.0.5 SQL Injection |
|---|
| Описание | The application "Taokeyun" version ≤1.0.5, developed by Taokeyun.cn, has a SQL Injection vulnerability in the file "application/index/controller/app/store/Goods.php". The function "shopGoods" does not properly sanitize the 'keyword' input parameter, allowing arbitrary SQL commands to be executed. This flaw can be exploited by an attacker to manipulate SQL queries, potentially leading to data leakage, data corruption, or even full system compromise. The vulnerability can be confirmed by sending a maliciously crafted request containing the SQL command 'sleep(5)', which causes a delay in the response if the SQL Injection point is present. |
|---|
| Источник | ⚠️ https://note.zhaoj.in/share/TKWDqowIoLqs |
|---|
| Пользователь | glzjin (UID 59815) |
|---|
| Представление | 11.01.2024 08:52 (2 лет назад) |
|---|
| Модерация | 12.01.2024 12:11 (1 day later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 250586 [Taokeyun до 1.0.5 HTTP POST Request Goods.php shopGoods keyword SQL-инъекция] |
|---|
| Баллы | 20 |
|---|