关联漏洞
标题:HSC Cybersecurity HC Mailinspector SQL注入漏洞 (CVE-2024-34472)Description:HSC Cybersecurity HC Mailinspector是HSC Cybersecurity公司的一个云电子邮件安全解决方案。 HSC Cybersecurity HC Mailinspector 5.2.17-3 到 v.5.2.18版本存在SQL注入漏洞,该漏洞源于对 /mailinspector/mliRealtimeEmails.php 的 POST 请求中的 ordemGrid 参数无法正确清理输入,从而允许经过身份验证的攻击者执行任意 SQL 命令。
介绍
# CVE-2024-34472
**Description:** An authenticated user can abuse Blind SQL injection vulnerability exists in the `mliRealtimeEmails.php` file. The `ordemGrid` parameter in a POST request to `/mailinspector/mliRealtimeEmails.php` does not Properly sanitize input, allowing an authenticated attacker to execute arbitrary SQL commands, leading to the potential disclosure of the entire application database.
**Versions:** Discovered in HSC Mailinspector 5.2.17-3 but applicable to all versions up to 5.2.18.
## Proof of Concept
While navigating through the email inbox, a POST request to `/mailinspector/mliRealtimeEmails.php` was detected, passing the following parameters:
> POST Payload: `point=3&start=0&limit=30&sort=datetime&dir=DESC&exe=getLastMessages&idCluster=true&idClusterPoint=0&ordemGrid=<SQL INJECTION HERE>&ordemGridDirection=DESC`

The parameter `ordemGrid` doesn't seem to handle the data inserted into it properly, allowing SQL code to be interpreted when passed through it.

文件快照
[4.0K] /data/pocs/c8257fe712b9ae27d6815477194c54df2b2b070c
├── [ 74K] blind-post.png
├── [198K] blind_sqli_mailinspector.png
└── [1.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。