提交 #596573: xxyopen novel-plus 5.1.3 SQL Injection信息

标题xxyopen novel-plus 5.1.3 SQL Injection
描述A critical SQL injection vulnerability exists in the user management module. The `/list` endpoint, which retrieves a list of system users, unsafely uses string substitution (`${...}`) for the `sort` and `order` parameters within its MyBatis `ORDER BY` clause. This allows any authenticated user who can access this endpoint to execute arbitrary SQL commands. Because the query targets the `sys_user` table, this flaw can be exploited to exfiltrate highly sensitive information, including usernames, email addresses, and password hashes, compromising all user accounts on the system.
来源⚠️ https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure
用户
 bpy9ft (UID 85221)
提交2025-06-13 11時38分 (11 月前)
管理2025-06-23 16時32分 (10 days later)
状态已接受
VulDB条目313654 [xxyopen/201206030 novel-plus 直到 5.1.3 User Management UserMapper.xml list sort/order SQL注入]
积分20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!