You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Suggested description]
There is a SQL Injection vulnerability in crmeb_java <=1.3.4, caused by the param sortKey which is in ${} format and isn't strictly filtered.
[Impact Code execution]
true
[Cause of vulnerability]
The interface /spread/people call the function getSpreadPeopleList
Make sure the user has secondary promoter, the it will call the function getSpreadPeopleList.
There is a trick that the order by statement is only executed if there are at least two promoters.
The param sortKey is ${} format and it will be joined to the sql string directly.
That's all, thanks.
The text was updated successfully, but these errors were encountered:
[Suggested description]
There is a SQL Injection vulnerability in crmeb_java <=1.3.4, caused by the param
sortKey
which is in${}
format and isn't strictly filtered.[Vulnerability Type]
SQLi
[Vendor of Product]
https://github.com/crmeb/crmeb_java
[Affected Product Code Base]
<=1.3.4
[Affected Component]
/api/front/spread/people
[Attack Type]
Remote
[Vulnerability details]
Make sure the user has at least two promoters.
Send the crafted request package to the api interface
/api/front/spread/people
[Impact Code execution]
true
[Cause of vulnerability]
The interface
/spread/people
call the functiongetSpreadPeopleList
Make sure the user has secondary promoter, the it will call the function
getSpreadPeopleList
.There is a trick that the
order by
statement is only executed if there are at least two promoters.The param
sortKey
is${}
format and it will be joined to the sql string directly.That's all, thanks.
The text was updated successfully, but these errors were encountered: