Reinforcement proposal:
Improve the filter function
Code review:
Local building environment.
\aitecms\include\common.inc.php CheckRequest Filter function line 88 to submit content, imperfect.
Call CheckRequest to check $_REQUEST
Bypass _RunMagicQuotes checks, bypass addslashes function checks
Connect to a Database \wamp\www\aitecms\include\common.inc.php
\wamp\www\aitecms\include\dedesql.class.php
Bypass SQL security checks
Finally, the editor submitted successfully
The text was updated successfully, but these errors were encountered:
Vulnerability description
Test object:
Test time:
March 17, 2019
Description of vulnerability:
AiteCms system background -SQL injection vulnerability. Background management center - online message - remarks, SQL injection vulnerability
POC and verification
Local setup environment:
Install AiteCms guide: http://www.aitecms.com/view-4-1.html
Bug:
Verification method:
sqlmap.py -l aitecmsSQLi.txt --batch --random-agent -o --dbms="mysql" -p id -v 4AitecmsSQLi.txt:
Vulnerability to prove:


Reinforcement proposal:
Improve the filter function
Code review:



Local building environment.
\aitecms\include\common.inc.php CheckRequest Filter function line 88 to submit content, imperfect.
Call CheckRequest to check $_REQUEST
Bypass _RunMagicQuotes checks, bypass addslashes function checks
Connect to a Database \wamp\www\aitecms\include\common.inc.php




\wamp\www\aitecms\include\dedesql.class.php
Bypass SQL security checks
Finally, the editor submitted successfully
The text was updated successfully, but these errors were encountered: