# N/A
## 漏洞概述
未经过身份验证的用户可以执行SQL语句,从而对底层数据库进行任意读取操作,导致敏感数据泄露。
## 影响版本
- Magento 2.1 前所有版本(至2.1.18)
- Magento 2.2 前所有版本(至2.2.9)
- Magento 2.3 前所有版本(至2.3.2)
## 细节
该漏洞允许攻击者通过执行SQL语句获得数据库的任意读取权限,攻击过程中无需用户验证。
## 影响
导致敏感数据泄露。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | An unauthenticated user can execute SQL statements that allow arbitrary read access to the underlying database, which causes sensitive data leakage. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-7139.yaml | POC详情 |
2 | Proof-of-Concept (PoC) exploit for CVE-2019-7139, an unauthenticated SQL injection vulnerability in Magento (PRODSECBUG-2198). For educational and security research purposes only. Use with explicit permission from system owners. Includes documentation and mitigations. | https://github.com/adhammedhat111/Magento-CVE-2019-7139-SQLi-PoC | POC详情 |
暂无评论