Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

There is a sql injection vulnerability in the jeecg 3.4.4 building block report #4511

Closed
venom-404 opened this issue Jan 29, 2023 · 3 comments

Comments

@venom-404
Copy link

Use the system default account password to log in to the system.
In the visual design menu - report design, see Figure 1 for details.
截屏2023-01-29 22 01 08
Then click New Report, see Figure 2 for details.
截屏2023-01-29 22 03 48
Click the + sign to select a new SQL data set, see Figure 3 for details.
截屏2023-01-29 22 07 51
Select and enter the corresponding data according to Figure 4, the payload is as follows:
截屏2023-01-29 22 11 59
payload:select * from sys_user WHERE id='' union SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,(select group_concat(SCHEMA_NAME) from information_schema.SCHEMATA)
According to the execution result, all the database information of the mysql server of the system can be obtained, see Figure 5 for details.
截屏2023-01-29 22 14 53
So far the vulnerability has surfaced successfully.

@zhangdaiscott
Copy link
Member

ty

@tygithub1
Copy link

已修改

@SingularityGS
Copy link

解决方案是啥

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants