Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-37203 PoC — JFinal SQL注入漏洞

Source
Associated Vulnerability
Title:JFinal SQL注入漏洞 (CVE-2022-37203)
Description:JFinal是一款基于Java语言的WEB+ORM开源框架。 JFinal CMS 5.1.0版本存在SQL注入漏洞,该漏洞源于接口没有使用相同的组件,也没有过滤器,而是各自使用了自己的 SQL 连接方式,导致 SQL 注入。
Description
CVE-2022-37203 POC
Readme
# CVE-2022-37203
CVE-2022-37203 POC


> [Additional Information]
> https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md
>
> ------------------------------------------
>
> [Vulnerability Type]
> SQL Injection
>
> ------------------------------------------
>
> [Vendor of Product]
> the development group
>
> ------------------------------------------
>
> [Affected Product Code Base]
> https://github.com/jflyfox/jfinal_cms - JFinal CMS 5.1.0
>
> ------------------------------------------
>
> [Affected Component]
> These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Impact Escalation of Privileges]
> true
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> jfinal_ CMS 5.1.0 SQL injection
>
> ------------------------------------------
>
> [Reference]
> https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md
>
> ------------------------------------------
>
> [Discoverer]
> jw5t
File Snapshot

[4.0K] /data/pocs/42e49a9a4fba0dcd9025bdb218486c34d9ed43bd ├── [ 34K] LICENSE └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.