| Title | Taokeyun Taokeyun ≤1.0.5 SQL Injection |
|---|
| Description | The Taokeyun software, version ≤2.1.5, contains a SQL Injection vulnerability in the 'User.php' file within the 'application/index/controller/m' directory. Specifically, the issue resides in the 'login' function where user input is directly incorporated into a SQL query without proper sanitization. This allows an attacker to manipulate the query structure, potentially leading to unauthorized access, data leakage, or even control over the database. The vulnerability can be confirmed by sending a crafted POST request to the login endpoint, causing the server to sleep for a specified duration, indicating successful SQL command execution. |
|---|
| Source | ⚠️ https://note.zhaoj.in/share/Np0ZdyKEnVOV |
|---|
| User | glzjin (UID 59815) |
|---|
| Submission | 01/11/2024 08:03 (2 years ago) |
|---|
| Moderation | 01/12/2024 12:11 (1 day later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 250584 [Taokeyun up to 1.0.5 HTTP POST Request User.php login Username sql injection] |
|---|
| Points | 20 |
|---|