R.s.W - Sql Injection
Red Spider Web CMS存在SQL注入漏洞,影响project.php、pic.php和gallery.php页面中的"id"参数。攻击者可通过注入特殊字符触发SQL错误并获取数据库信息或进行数据操作。 2025-12-14 22:33:22 Author: cxsecurity.com(查看原文) 阅读量:0 收藏

********************************************************* # Exploit Title: SQL Injection – Red Spider Web CMS # Date: 2025-12-11 # Exploit Author: ITACHI - SELI # Category: Web Applications # Tested on: Windows 10 / Kali Linux CVE: Not Assigned ********************************************************* ##Summary : A SQL Injection vulnerability was discovered in multiple websites developed using the Red Spider Web CMS. The issue exists in the "id" parameter of pages like project.php, pic.php, and gallery.php, where user input is not properly sanitized. ********************************************************* ###Dom : https://www.jbshowrah.com/project.php?id=47'/*!50000UNION/**_**/*//*!50000SELECT/**_**/*/ database(),2,3--+ https://www.oarindia.org/gallery.php?id=1 ********************************************************* ####Waf : Mod_Security #####bypass waf : /*!50000UNION*/ ********************************************************* ###Vulnerability : The id parameter is directly passed into SQL queries without validation. Adding special characters (e.g., ') triggers SQL errors, confirming injection vulnerability. ********************************************************* Example test input : ?id=-1' ##Impact : Database information disclosure Possible authentication bypass Data manipulation or deletion Potential full database compromise

References:

ITACHI – SELI telegram: @ir_itachi_ir Channel:

https://t.me/IR_ITACHI_1_UCHIHA_IR

Channel:

https://t.me/Selii_404

Email: [email protected]




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025120011
如有侵权请联系:admin#unsafe.sh