Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-37204 PoC — JFinal SQL注入漏洞

Source
Associated Vulnerability
Title:JFinal SQL注入漏洞 (CVE-2022-37204)
Description:JFinal是一款基于Java语言的WEB+ORM开源框架。 JFinal CMS 5.1.0版本存在SQL注入漏洞,该漏洞源于没有防止sql注入的措施,导致SQL注入。
Description
CVE-2022-37204 POC
Readme
# CVE-2022-37204
CVE-2022-37204 POC


> [Suggested description]
> ** RESERVED **JFinal CMS 5.1.0 is vulnerable to SQL Injection.
>
> ------------------------------------------
>
> [Additional Information]
> https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md
>
> ------------------------------------------
>
> [Vulnerability Type]
> SQL Injection
>
> ------------------------------------------
>
> [Vendor of Product]
> the development group
>
> ------------------------------------------
>
> [Affected Product Code Base]
> https://github.com/jflyfox/jfinal_cms - JFinal CMS 5.1.0
>
> ------------------------------------------
>
> [Affected Component]
> These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> User login is required
>
> ------------------------------------------
>
> [Reference]
> https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md
>
> ------------------------------------------
>
> [Discoverer]
> jw5t
File Snapshot

[4.0K] /data/pocs/a0fcebff9241ce830b2ae4e123939b2d0e0f1f2d ├── [ 11K] LICENSE └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.