漏洞标题
"QDocs智能学校管理系统聊天 mynewuser sql注入"
漏洞描述信息
在QDocs智能学校管理系统7.0.0中发现了一个被分类为关键级别的漏洞。受影响的功能是组件Chat中的文件 /user/chat/mynewuser。通过将参数users[]的输入设置为1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM作为POST请求参数的一部分,可以导致SQL注入。攻击可以远程进行。攻击方法已被公开并可能被利用。升级到版本7.0.1可以解决这个问题。建议升级受影响的组件。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
QDocs Smart School Management System Chat mynewuser sql injection
漏洞描述信息
A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
QDocs Smart School Management System SQL注入漏洞
漏洞描述信息
QDocs Smart School Management System是QDocs公司的一个智慧团建系统。 QDocs Smart School Management System 7.0.0版本存在SQL注入漏洞,该漏洞源于文件/user/chat/mynewuser的参数会导致SQL注入。
CVSS信息
N/A
漏洞类别
SQL注入