[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #468543: code-projects Travel Management System Using PHP 1.0.0 SQL InjectionИнформация

Titlecode-projects Travel Management System Using PHP 1.0.0 SQL Injection
DescriptionThe SQL Injection vulnerability exists in diretory '/travel/subcat.php?catid=7' because the 'catid' parameter is directly inserted into the SQL queries without any validation or sanitization. If an attacker inputs malicious SQL code as the 'catid' parameter, it will be executed by the database. For example, if the 'catid' parameter is set to "7' UNION ALL SELECT CONCAT(0x7176706b71,0x70424a575748424d4d587a677a69636d6f6d7756616c474652596a515572434b55646158675a4a6b,0x716a767671),NULL,NULL,NULL,NULL-- -", it could manipulate the query to return or modify unintended data. Always use prepared statements or parameterized queries to prevent this. Payload: catid=7' UNION ALL SELECT CONCAT(0x7176706b71,0x70424a575748424d4d587a677a69636d6f6d7756616c474652596a515572434b55646158675a4a6b,0x716a767671),NULL,NULL,NULL,NULL-- -
Source⚠️ https://code-projects.org/travel-management-system-using-php-source-code/
User
 Fergod (UID 55882)
Submission24.12.2024 18:01 (2 месяцы назад)
Moderation25.12.2024 19:11 (1 day later)
Statusпринято
VulDB Entry289313 [code-projects Travel Management System 1.0 /subcat.php catid sql injection]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!