Skip to content

Latest commit

 

History

History
15 lines (8 loc) · 562 Bytes

sql2.md

File metadata and controls

15 lines (8 loc) · 562 Bytes

Unauthorized SQL injection vulnerability exists in Access OA

version:v2017

Routing: general/hr/recruit/filter/delete PHP

The injected parameter $FILTER_ID exists

Here the code is very concise, when the $FILTER_ID is not empty, the parameter is concatenated directly into the SQL statement, which is bypassed because the parentheses are closed.

WPS图片(1)

POC

WPS图片(2)