Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5356 PoC — AJ-Report SQL注入漏洞

Source
Associated Vulnerability
Title:AJ-Report SQL注入漏洞 (CVE-2024-5356)
Description:AJ-Report是anji-plus开源的一个完全开源,拖拽编辑的可视化设计工具。 anji-plus AJ-Report 1.4.1及之前版本存在SQL注入漏洞,该漏洞源于文件/dataSet/testTransform的参数dynCsentence存在SQL注入漏洞。
Readme
##exp.py -u指定url或-f指定文件批量检测,-t指定线程,-h查看帮助

##使用 pi install requirements.txt python exp.py -u 目标url -t 10 python exp.py -h

#注意事项 保证url以http://或https://开头,否则会报错无法执行
File Snapshot

[4.0K] /data/pocs/3cf47dd90965ac82d8d1faaf0cf7f5e7b4248ecb ├── [2.0K] exp.py └── [ 252] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.