Submit #266016: Taokeyun Taokeyun ≤1.0.5 SQL Injectioninfo

TitleTaokeyun Taokeyun ≤1.0.5 SQL Injection
DescriptionThe application "Taokeyun" version ≤1.0.5, developed by Taokeyun.cn, has a SQL Injection vulnerability in the file "application/index/controller/app/store/Goods.php". The function "shopGoods" does not properly sanitize the 'keyword' input parameter, allowing arbitrary SQL commands to be executed. This flaw can be exploited by an attacker to manipulate SQL queries, potentially leading to data leakage, data corruption, or even full system compromise. The vulnerability can be confirmed by sending a maliciously crafted request containing the SQL command 'sleep(5)', which causes a delay in the response if the SQL Injection point is present.
Source⚠️ https://note.zhaoj.in/share/TKWDqowIoLqs
User
 glzjin (UID 59815)
Submission01/11/2024 08:52 (2 years ago)
Moderation01/12/2024 12:11 (1 day later)
StatusAccepted
VulDB entry250586 [Taokeyun up to 1.0.5 HTTP POST Request Goods.php shopGoods keyword sql injection]
Points20

Do you know our Splunk app?

Download it now for free!