Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-45206: /sys/duplicate/check存在sql注入漏洞 · Issue #4129 · jeecgboot/jeecg-boot

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.

CVE
#sql#vulnerability#git#auth

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

azraelxuemo opened this issue

Oct 25, 2022

· 10 comments

Comments

就是最新的,但是可以绕过

—原始邮件— 发件人: ***@***.***> 发送时间: 2022年10月30日(周日) 下午3:33 收件人: ***@***.***>; 抄送: ***@***.******@***.***>; 主题: Re: [jeecgboot/jeecg-boot] /sys/duplicate/check存在sql注入漏洞 (Issue #4129) 你这个是哪个版本,针对注释这种我们处理过 — Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: ***@***.***>

你们自己看我发的内容,里面你们加check了啊,但是check有问题,可以被bypass我已经说的很详细了,我是直接clone你们的项目

—原始邮件— 发件人: ***@***.***> 发送时间: 2022年10月30日(周日) 下午3:41 收件人: ***@***.***>; 抄送: ***@***.******@***.***>; 主题: Re: [jeecgboot/jeecg-boot] /sys/duplicate/check存在sql注入漏洞 (Issue #4129) 截图版本号 — Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: ***@***.***>

改成这样就好了

okok好的好的,因为我看到的是checksql可以被绕过,所以就提出来了哈哈哈2333

—原始邮件— 发件人: ***@***.***> 发送时间: 2022年10月30日(周日) 下午4:22 收件人: ***@***.***>; 抄送: ***@***.******@***.***>; 主题: Re: [jeecgboot/jeecg-boot] /sys/duplicate/check存在sql注入漏洞 (Issue #4129) 改成这样就好了 — Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: ***@***.***>

这个是我的版本号

我个人建议还是把sql注入里面的空格删掉
因为你们替换了//
但还可以用()绕过
updatexml(1,(select(if(length(“aaa”)>5,1,sleep(10)))union select(1)),1)
所以索性你们就不替换/
/这些
然后直接把输入的整个字符串转成小写
判断有没有select,这种关键字

您看这样还是可以注入的
就算我修改了还是可以绕过的

2 participants

Related news

GHSA-g5cj-5h58-j93w: Jeecg-boot vulnerable to SQL Injection

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907