漏洞标题
CXBSoft 邮件服务器 HTTP POST 请求 reg_go.php SQL 注入攻击
漏洞描述信息
在CXBSoft Post-Office的1.0版本中发现了一个漏洞,被列为高危。受影响的功能是HTTP POST请求处理程序组件中的文件/apps/reg_go.php中的一些未知功能。通过操纵username_reg参数可能导致SQL注入。该漏洞已被公开披露并可能被利用。此漏洞的标识符为VDB-250700。注意:我们很早就向供应商报告了这一披露,但对方没有任何回应。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
CXBSoft Post-Office HTTP POST Request reg_go.php sql injection
漏洞描述信息
A vulnerability was found in CXBSoft Post-Office up to 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /apps/reg_go.php of the component HTTP POST Request Handler. The manipulation of the argument username_reg leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250700. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
CXBSoft Post-Office SQL注入漏洞
漏洞描述信息
CXBSoft Post-Office是CXBSoft公司的一个邮局系统。 CXBSoft Post-Office 1.0及之前版本存在SQL注入漏洞,该漏洞源于文件/apps/reg_go.php的参数username_reg存在SQL注入漏洞。
CVSS信息
N/A
漏洞类别
SQL注入