We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A SQL injection vulnerability exists in Fanwei e-cology 8.0 via the getdata.jsp endpoint. The application directly passes unsanitized user input from the sql parameter into a database query within the getSelectAllIds(sql, type) method, reachable through the cmd=getSelectAllId workflow in the AjaxManager. This allows unauthenticated attackers to execute arbitrary SQL queries, potentially exposing sensitive data such as administrator password hashes.
Reserved 2025-04-15 | Published 2025-06-24 | Updated 2025-06-24 | Assigner VulnCheckCWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
r1ch4rd_L
www.cnblogs.com/0day-li/p/14637680.html
www.cnvd.org.cn/flaw/show/CNVD-2021-33202
www.weaver.com.cn/
vulncheck.com/advisories/fanwei-ecology-sql-injection
Support options