SQL injection in TuziCMS - CVE-2019-16644
Published: September 21, 2019 / Updated: September 22, 2019
TuziCMS
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists in the App\Home\Controller\ZhuantiController.class.php file due to insufficient sanitization of user-supplied data passed via the id parameter to /index.php/Zhuanti/group URL. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Exploit:
http://[host]/index.php/Zhuanti/group?id=1 and (extractvalue(1,concat(0x7e,(select VERSION()),0x7e)))