Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9053 PoC — CMS Made Simple SQL注入漏洞

Source
Associated Vulnerability
Title:CMS Made Simple SQL注入漏洞 (CVE-2019-9053)
Description:CMS Made Simple(CMSMS)是CMSMS团队的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMSMS 2.2.8版本中存在SQL注入漏洞,该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
CVE-2019-9053 rewritten in python3 to fix broken syntax. Affects CMS made simple <2.2.10
Readme
# CVE-2019-9053 (SQLI on CMS <=2.2.10

# Found by Daniele Scanu. Can be found [Here](https://www.exploit-db.com/exploits/46635)


##  Fixes the problem:  "File "/home/user/CVE-2019-9053", line 25
    print "[+] Specify an url target"
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?", 
including all other incorrect printing syntax
File Snapshot

[4.0K] /data/pocs/00a625f5bd87d5388ba8d4144d1956657d73f79f ├── [6.3K] 46635.py └── [ 403] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.