Submit #265989: Taokeyun Taokeyun ≤1.0.5 SQL Injectioninfo

TitleTaokeyun Taokeyun ≤1.0.5 SQL Injection
DescriptionThe Taokeyun software, version ≤2.1.5, contains a SQL Injection vulnerability in the 'User.php' file within the 'application/index/controller/m' directory. Specifically, the issue resides in the 'login' function where user input is directly incorporated into a SQL query without proper sanitization. This allows an attacker to manipulate the query structure, potentially leading to unauthorized access, data leakage, or even control over the database. The vulnerability can be confirmed by sending a crafted POST request to the login endpoint, causing the server to sleep for a specified duration, indicating successful SQL command execution.
Source⚠️ https://note.zhaoj.in/share/Np0ZdyKEnVOV
User
 glzjin (UID 59815)
Submission01/11/2024 08:03 (2 years ago)
Moderation01/12/2024 12:11 (1 day later)
StatusAccepted
VulDB entry250584 [Taokeyun up to 1.0.5 HTTP POST Request User.php login Username sql injection]
Points20

Do you know our Splunk app?

Download it now for free!