esiclivre 0.2.2 SQL Injection
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。我得先仔细阅读文章内容,理解主要信息。 文章标题是关于CVE-2026-30655的SQL注入漏洞,出现在esiclivre的密码重置功能中。摘要部分提到攻击者可以通过cpfcnpj参数注入SQL,导致敏感信息泄露。技术细节里说明问题出在Solicitante::resetaSenha()函数中没有使用参数化查询。 影响方面,可能导致未经授权的信息泄露。修复建议包括使用预处理语句、验证输入和限制访问。时间线显示漏洞在2025年4月报告,2026年3月获得CVE编号。 总结时需要涵盖漏洞名称、位置、攻击方式、影响和修复建议。控制在100字以内,直接描述内容,不使用“这篇文章”等开头。 可能的结构:CVE编号+项目名称+漏洞类型+攻击方式+影响+修复建议。确保信息准确且简洁。 </think> esiclivre项目存在SQL注入漏洞,攻击者可通过`cpfcnpj`参数在密码重置功能中注入SQL代码,导致敏感信息泄露。该漏洞影响v0.2.2及以下版本,建议采用参数化查询和输入验证修复。 2026-3-26 08:55:51 Author: cxsecurity.com(查看原文) 阅读量:5 收藏

# CVE-2026-30655 — SQL Injection in esiclivre (password reset) ## Summary A SQL injection vulnerability exists in the password reset endpoint of esiclivre. An unauthenticated attacker can inject SQL via the `cpfcnpj` POST parameter, potentially resulting in unauthorized access to sensitive information. ## Affected Project - Repository: https://github.com/esiclivre/esiclivre - Affected versions: v0.2.2 and earlier - Affected commit: up to and including 0a72b4c9ab89244ec3bd3d7fa0b765850cc9afd7 ## Technical Details - Endpoint: `POST /reset/index.php` - Parameter: `cpfcnpj` - Root cause: user input is concatenated into a SQL query in `Solicitante::resetaSenha()` without parameterization. ## Impact - Potential unauthorized access to sensitive database information (information disclosure). ## Mitigation / Fix No upstream fix is available at the time of publication. Recommended remediation: - Use parameterized queries (prepared statements) for database access. - Validate and sanitize user input. - Consider temporarily restricting access to the password reset endpoint until patched. ## Timeline - 2025-04-12: Reported to vendor/maintainers - 2026-02-09: CVE request submitted - 2026-03-23: CVE-2026-30655 assigned ## Credits Discovered by Bryan Romero (https://github.com/brynax).



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026030034
如有侵权请联系:admin#unsafe.sh