[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #468122: code-projects Simple Admin Panel In PHP 1.0.00 SQL Injectioninformação

Titlecode-projects Simple Admin Panel In PHP 1.0.00 SQL Injection
DescriptionThe SQL Injection vulnerability here exists because the "size" parameter in "/addCatController.php" is directly inserted into the SQL queries without any validation or sanitization. If an attacker inputs malicious SQL code as the "size" parameter, it will be executed by the database. For example, if the "size" parameter is set to 'test'||(SELECT 0x55684746 WHERE 8915=8915 AND (SELECT 1287 FROM(SELECT COUNT(*),CONCAT(0x716b6b6271,(SELECT (ELT(1287=1287,1))),0x717a7a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||'', it could manipulate the query to return or modify unintended data. Always use prepared statements or parameterized queries to prevent this.
Source⚠️ https://code-projects.org/simple-admin-panel-in-php-with-source-code/
User
 Havook (UID 71104)
Submission23/12/2024 23h29 (há 19 Dias)
Moderation25/12/2024 16h04 (2 days later)
StatusAceite
VulDB Entry289284 [code-projects Simple Admin Panel 1.0 /addCatController.php size sql injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!