1. Through analysis, it is found that com/pearadmin/modules/sys/mapper/xml/SysDictDataMapper.xml:12 uses ${} to pass in three parameters: text, code, and table. Therefore, there is SQL injection. Let's find out how to pass parameters.
2. You can see that the queryTableDictItemsByCode method is defined in com/pearadmin/modules/sys/mapper/SysDictDataMapper.java:41. Now let’s find where this method is called.
4. You can see that through the /system/dictData/getDictItems/{{dictCode}} interface, we can assign values to the three variables text, code, and table, and the parameter values are passed in through the path