This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis →
Q1What is this vulnerability? (Essence + Consequences)
- **Nature**: The `Name` parameter in `/admin/ajax.php?…
- 🚨 Can read, modify, and delete database content. - Privilege Requirement: **Normal User (PR:L)**. - Can steal orders, user information, and backend data. - 💡 Compromises integrity and confidentiality.
Q5Is exploitation threshold high? (Auth/Config)
- **Low Barrier**! - Requires only **login** to access the interface. - UI:N → No interaction required. - AC:L → Low attack complexity.
Q6Is there a public Exp? (PoC/Wild Exploitation)
- ✅ **Public exploit code** available. - 📎 GitHub PoC exists. - Tags include `exploit`. - ⚠️ Can be directly used for attacks.
Q7How to self-check? (Features/Scanning)
- 🔍 Check interface: `/admin/ajax.php?action=save_category`. - Detect if the `Name` parameter filters special characters. - Use SQL injection test payloads to observe response differences. - Refer to **VDB-359919** techn…