Skip to content

Bluecms V1.6 has SQL injection in line 22 of admin/area.php #1

@CainYzb

Description

@CainYzb

Bluecms_v1.6

Download

http://lp.downcode.com/j_14/j_14745_bluecms.rar

vulnerability code:

in admin/login.php line 21:

image-20230817113846684

In line 22 of the login code for admin/login.php, the parameter admin_name has not been filtered, allowing malicious users to implement a universal password through wide byte injection.
2

As shown in the figure, the Content Type in the packet response header tells us that the encoding is gb2312, because the single quotation mark is gpc, so wide byte injection is used here.
3

payload is

admin_name=1%df'%20or%201=1%23&admin_pwd=1&submit=%B5%C7%C2%BC&act=do_login

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions