Отправить #266016: Taokeyun Taokeyun ≤1.0.5 SQL InjectionИнформация

НазваниеTaokeyun Taokeyun ≤1.0.5 SQL Injection
ОписаниеThe application "Taokeyun" version ≤1.0.5, developed by Taokeyun.cn, has a SQL Injection vulnerability in the file "application/index/controller/app/store/Goods.php". The function "shopGoods" does not properly sanitize the 'keyword' input parameter, allowing arbitrary SQL commands to be executed. This flaw can be exploited by an attacker to manipulate SQL queries, potentially leading to data leakage, data corruption, or even full system compromise. The vulnerability can be confirmed by sending a maliciously crafted request containing the SQL command 'sleep(5)', which causes a delay in the response if the SQL Injection point is present.
Источник⚠️ https://note.zhaoj.in/share/TKWDqowIoLqs
Пользователь
 glzjin (UID 59815)
Представление11.01.2024 08:52 (2 лет назад)
Модерация12.01.2024 12:11 (1 day later)
Статуспринято
Запись VulDB250586 [Taokeyun до 1.0.5 HTTP POST Request Goods.php shopGoods keyword SQL-инъекция]
Баллы20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!