Title | code-projects Chat System 1.0.0.00 SQL Injection |
---|
Description | In the file 'update_user.php' located at /admin/update_user.php, there is a possibility of performing SQL injection on the 'name and id' parameter. This allows attackers to inject malicious SQL code into the query. For example, if the name and id parameter is set to:
error-based:
script=1' AND 4381=(SELECT (CASE WHEN (4381=4381) THEN 4381 ELSE (SELECT 6122 UNION SELECT 5924) END))-- - |
---|
Source | ⚠️ https://code-projects.org/chat-system-using-php-source-code/ |
---|
User | Havook (UID 71104) |
---|
Submission | 28/12/2024 16h18 (há 15 Dias) |
---|
Moderation | 29/12/2024 16h38 (1 day later) |
---|
Status | Aceite |
---|
VulDB Entry | 289768 [code-projects Chat System 1.0 /admin/update_user.php id sql injection] |
---|
Points | 20 |
---|