415 Star 2.4K Fork 1.1K

Pear Admin/Pear Admin Boot

 / 详情

Pear-Admin-Boot <=2.0.2 background /loadDictItem interface SQL injection

待办的
创建于  
2024-06-14 17:35

Vulnerability Product:Pear Admin Boot
Vulnerability version:<=2.0.2
Vulnerability type:sql injection
Vulnerability Details:

  1. First, in com/pearadmin/modules/sys/mapper/xml/SysDictDataMapper.xml, we found that ${} was used to pass in the three parameters of text, code, and table, so there was SQL injection. Now let's find out how to pass the parameters.
    输入图片说明

  2. In com/pearadmin/modules/sys/mapper/SysDictDataMapper.java:62, we found the queryTableDictByKeys method declared. Now let’s find where this method is called again.
    输入图片说明

  3. Find the method call in com/pearadmin/modules/sys/service/impl/SysDictDataServiceImpl.java:101, and then look up
    输入图片说明

  4. Next, we found that the queryTableDictByKeys method was called in com/pearadmin/modules/sys/controller/SysDictDataController.java:127. The text, code, and table variables can be assigned values ​​through the /system/dictData/loadDictItem/{{dictCode}} interface, and the parameter values ​​are passed in through the path.
    输入图片说明

  5. Finally, our payload is as follows

http://localhost:8088/system/dictData/loadDictItem/sys_user,user(),1?key=1

输入图片说明

评论 (2)

rabbit 创建了任务

find by Chaitin Security Research Lab

登录 后才可以发表评论

状态
负责人
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
参与者(1)
Java
1
https://gitee.com/pear-admin/pear-admin-boot.git
git@gitee.com:pear-admin/pear-admin-boot.git
pear-admin
pear-admin-boot
Pear Admin Boot

搜索帮助

Dd8185d8 1850385 E526c682 1850385