Title | SQL injection vulnerability exists in Best courier management system |
---|
Description | SQL injection vulnerability exists in s parameter of parcel_list.php file of Best courier management system
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
When visit index.php and get parameter is ‘page=parcel_list’,it will include parcel_list.php,and ‘s’ parameter can do sql injection.
Payload: page=parcel_list&s=1 AND (SELECT 8262 FROM (SELECT(SLEEP(5)))tQBY)-- bljl |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%201.pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
---|
Submission | 23.09.2023 08:44 (1 Год назад) |
---|
Moderation | 29.09.2023 08:33 (6 days later) |
---|
Status | принято |
---|
VulDB Entry | 240882 [SourceCodester Best Courier Management System 1.0 GET Parameter parcel_list.php s sql injection] |
---|
Points | 20 |
---|