Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bloofox 0.5.2 sql injection #2

Open
jspring996 opened this issue Mar 6, 2023 · 0 comments
Open

bloofox 0.5.2 sql injection #2

jspring996 opened this issue Mar 6, 2023 · 0 comments

Comments

@jspring996
Copy link
Owner

jspring996 commented Mar 6, 2023

background sql injection

source address
https://github.com/alexlang24/bloofoxCMS/archive/refs/heads/master.zip

Injection exists at /admin/index.php?mode=content&page=pages&action=edit&eid=1
image

Find the corresponding location of the source code through the page information, but most of the $_POST[] data has a filter function validate_text()
Only 'eid' does not add filter
image
image

Test page
image
image

Sqlmap result display
image

Protection suggestion

add a filter function validate_text() to $_POST['eid']

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant