| 标题 | Shenzhen Ruiming Technology Co., Ltd. Streamax Crocus O&M Platform 1.3.44 SQL Injection |
|---|
| 描述 | A critical SQL injection vulnerability exists in the Streamax Crocus O&M Platform. The application fails to properly validate the State parameter in the DevicePrint.do component. An attacker can bypass the login requirement by providing a forged base64-encoded cookie Saffron.U="VUlEPTE=" (decodes to UID=1). This allows a remote, unauthenticated attacker to execute arbitrary SQL commands. By using time-based blind injection techniques (e.g., BENCHMARK or SLEEP), the attacker can extract sensitive system data and potentially compromise the entire database server. |
|---|
| 来源 | ⚠️ https://my.feishu.cn/docx/J8fHdY906o98pax4oCacWLTKndP?from=from_copylink |
|---|
| 用户 | 0menc (UID 75423) |
|---|
| 提交 | 2026-03-11 10時24分 (19 日前) |
|---|
| 管理 | 2026-03-27 08時55分 (16 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 353833 [Shenzhen Ruiming Technology Streamax Crocus 1.3.44 Parameter DevicePrint.do?Action=ReadTask State SQL注入] |
|---|
| 积分 | 20 |
|---|