[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #469311: PHPGurukul Small CRM in PHP 1.0 SQL Injectioninfo

TitlePHPGurukul Small CRM in PHP 1.0 SQL Injection
DescriptionThe SQL Injection vulnerability exists in diretory '/crm/admin/edit-user.php?id=1' because the 'id' parameter is directly inserted into the SQL queries without any validation or sanitization. If an attacker inputs malicious SQL code as the 'id' parameter, it will be executed by the database. For example, if the 'id' parameter is set to "id=1' AND (SELECT 8224 FROM (SELECT(SLEEP(5)))riQp)-- RGaL", it could manipulate the query to return or modify unintended data. Always use prepared statements or parameterized queries to prevent this.
Source⚠️ https://phpgurukul.com/small-crm-php/
User
 Fergod (UID 55882)
Submission26/12/2024 20:12 (il y a 1 mois)
Moderation28/12/2024 09:35 (2 days later)
StatusAccepté
VulDB Entry289660 [PHPGurukul Small CRM 1.0 /admin/edit-user.php id sql injection]
Points20

Interested in the pricing of exploits?

See the underground prices here!