| 标题 | z-9527 admin ≤ commit 72aaf2d SQL Injection |
|---|
| 描述 | A SQL blind injection vulnerability exists in Z-9527 Admin ≤ commit 72aaf2d at the /user/checkName endpoint, where the username query parameter is concatenated directly into a SQL statement without sanitization or parameterization. As a result, unauthenticated attackers can inject malicious SQL payloads using time-based blind-injection techniques to infer sensitive database information character-by-character through response-time analysis. This enables complete database enumeration, credential extraction, and potential privilege escalation. Mitigations include immediately replacing string concatenation with parameterized queries or prepared statements, implementing strict input validation and sanitization for all user-supplied parameters, applying the principle of least privilege to database connections, deploying web application firewalls with SQL injection detection rules, and conducting comprehensive security audits of all database query construction patterns across the codebase. |
|---|
| 来源 | ⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/z9527-admin/vulnerability-1 |
|---|
| 用户 | Anonymous User |
|---|
| 提交 | 2026-02-14 14時45分 (2 月前) |
|---|
| 管理 | 2026-02-25 15時04分 (11 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 347772 [z-9527 admin 1.0/2.0 user.js checkName/register/login/getUser/getUsers SQL注入] |
|---|
| 积分 | 20 |
|---|