The Group Buying cooperation submission page of public comments uses an open-source investigation program LimeSurvey. In fact, the packages that are slightly concerned with this program will know that this program has several injection holes, I tried it when I had nothing to worry about recently. I found that there was a problem with SQL injection.
Detailed Description: through the common SQL injection point scanning program on the internet, several possible SQL Injection problems are found, and the vulnerability information about LimeSurvey on the internet is combined, you can easily find several injection points.
When the page is submitted. Modify the post modification information and insert the SQL blind injection statement.
Fieldnames = 17165X6X18SQ001% 7C17165X6X18SQ002% region = null where id = 6 AND id IN (select if (( select substring (users_name, 1) FROM lime_users WHERE uid = 1) LIKE 'a % ', 1, SLEEP (5) -- % 7 Csrid
MULTI17165X6X18 = 8
Www.2cto.com is not listed in the whole process. The SQL blind injection vulnerability is fixed in the latest official version.
Solution:
The program has been updated or the Code with the vulnerability has been modified.