| Title | Taokeyun Taokeyun ≤1.0.5 SQL Injection |
|---|
| Description | The application "Taokeyun" version ≤1.0.5, developed by Taokeyun.cn, has a SQL Injection vulnerability in the file "application/index/controller/app/store/Goods.php". The function "shopGoods" does not properly sanitize the 'keyword' input parameter, allowing arbitrary SQL commands to be executed. This flaw can be exploited by an attacker to manipulate SQL queries, potentially leading to data leakage, data corruption, or even full system compromise. The vulnerability can be confirmed by sending a maliciously crafted request containing the SQL command 'sleep(5)', which causes a delay in the response if the SQL Injection point is present. |
|---|
| Source | ⚠️ https://note.zhaoj.in/share/TKWDqowIoLqs |
|---|
| User | glzjin (UID 59815) |
|---|
| Submission | 01/11/2024 08:52 (2 years ago) |
|---|
| Moderation | 01/12/2024 12:11 (1 day later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 250586 [Taokeyun up to 1.0.5 HTTP POST Request Goods.php shopGoods keyword sql injection] |
|---|
| Points | 20 |
|---|