BigTree CMS sql注入与反序列化

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

# Chaining SQL Injection and XSS BigTree CMS suffers from a plain SQL Injection which can be exploited in the dashboard. An unsanitized parameter allows overriding the `Table` property, enabling the manipulation of the underlying SQL syntax to extract arbitrary sensitive information from the database. The web application then continues to print all the data retrieved through the SQL query and returns it to the authenticated administrator. Since BigTree does not make use of any CSRF tokens here, the vulnerability can be exploited through CSRF. A Second Order Cross-Site Scripting vulnerability can then be used to smuggle the data out to an external Server. In the following we will see the entry point to the vulnerability: ```php core/admin/ajax/dashboard/check-module-integrity.php $form = BigTreeAutoModule::getForm($_GET["form"]); // Create a generic module class to get the decoded item data $m = new BigTreeModule; $m->Table = $form["table"]; $item = $m->get($_GET["id"]); ``` On line...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息