| 标题 | Novel-Plus 3.6.2 exists SQL injection |
|---|
| 描述 | The vulnerability was found in the backend, and during the white-box audit, it was discovered that the backend password was weak by default, and the cause was the inability to pre-compile the orderby field using mybatis, and no filtering was done
There is a list method under the author controller in the novel module, which does not have any processing of the parameters to go to the next step in the process |
|---|
| 来源 | ⚠️ https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit2.0.pdf |
|---|
| 用户 | yece (UID 43741) |
|---|
| 提交 | 2023-03-31 03時10分 (3 年前) |
|---|
| 管理 | 2023-04-14 08時31分 (14 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 225917 [novel-plus 3.6.2 list?limit=10&offset=0&order=desc sort SQL注入] |
|---|
| 积分 | 19 |
|---|