We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability has been found in xxyopen/201206030 novel-plus up to 5.1.3 and classified as critical. This vulnerability affects the function list of the file novel-admin/src/main/resources/mybatis/system/UserMapper.xml of the component User Management Module. The manipulation of the argument sort/order leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
In xxyopen/201206030 novel-plus bis 5.1.3 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es die Funktion list der Datei novel-admin/src/main/resources/mybatis/system/UserMapper.xml der Komponente User Management Module. Dank der Manipulation des Arguments sort/order mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
2025-06-23: | Advisory disclosed |
2025-06-23: | VulDB entry created |
2025-06-23: | VulDB entry last update |
bpy9ft (VulDB User)
vuldb.com/?id.313654 (VDB-313654 | xxyopen/201206030 novel-plus User Management Module UserMapper.xml list sql injection)
vuldb.com/?ctiid.313654 (VDB-313654 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.596573 (Submit #596573 | xxyopen novel-plus 5.1.3 SQL Injection)
blog.0xd00.com/...er-list-leads-to-sensitive-data-disclosure
blog.0xd00.com/...er-list-leads-to-sensitive-data-disclosure
Support options